How to protect your company from leaked trade secrets

It’s more important than ever to protect your IP, warns Clare Hopping.

Although much of the protection comes via employee contracts, there are things an IT department can do to ensure confidential information stays confidential and never leaks or is taken with employees to their next job.

Tarzey adds: "What IT departments can more effectively do is prevent the accidental, unintentional leaking of confidential info through the use of data loss prevention techniques, but if an employee is determined to steal stuff they have legitimate access to, it is hard to prevent."

Capital Law advises businesses to take the issue seriously and follow a number of steps to ensure their information is suitably protected.

After an employee has joined a company and their contract is water-tight, a company can limit the circulation of any key information within the workplace, marking sensitive information as confidential' and even by using different coloured paper for confidential documents.

Advertisement - Article continues below

From a tech point of view, an IT department can use password protection on digital files or in locked cabinets, implement monitoring within the workplace together with behavioural monitoring (and a suitable policy) and ensure that there is a proper reporting procedure within the workplace if an employee suspects information has been stolen.

Although no plan is full-proof, ensuring a company is protected from day one and a plan can be put in place if information leaks or trade secrets are stolen, the process can be completed in a more efficient manner, saving time and money.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Most Popular

identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019

Five signs that it’s time to retire IT kit

29 Nov 2019

Where modernisation and sustainability meet: A tale of two benefits

25 Nov 2019