Similar Articles |
|
Entrepreneur June 2007 Marc Diener |
Top Secret Confidential data should be handled with care. |
Inc. December 1, 2009 |
How to Protect Your Trade Secrets If you invent something potentially valuable, you may very well want to invest in obtaining a patent. But most companies haven't invented anything -- and yet they still own intellectual property that needs protection. |
CIO August 28, 2009 Howell & Perera |
How to Protect Your Legal Rights When Sharing IT Services To get the benefits from shared services, you need to address the risks to your company's intellectual property. |
Entrepreneur February 2006 Jane Easter Bahls |
Shh...It's a Secret When employees leave your company to work for a competitor, make sure they don't take your competitive edge with them. The law protects trade secrets, but only if employees understand the information is confidential. |
Financial Advisor October 2004 Chaplin & Giachetti |
Contingency Planning And Rule 206(4)-7 What must a financial advisor do to comply? |
Inc. May 23, 2003 Carole Matthews |
Keep Information Under Wraps To protect your company's critical information, you must first realize what information is critical and then put the necessary safeguards in place to assure your employees know it, too. |
Investment Advisor August 2006 Thomas D. Giachett |
Expert's Corner: A Process, Not a Destination With the advent of SEC Rule 206(4) 7, which requires SEC-registered investment advisors to implement and maintain policies and procedures appropriate for their investment advisory business, it is more critical than ever for all RIAs to recognize that compliance is an ongoing process. |
IndustryWeek January 1, 2006 Tonya Vinas |
Sarbanes-Oxley: New Liabilities For Trade Secrets Executives need to handle trade secrets according to new rules, or be subject to punishment under Sarbanes-Oxley. |
Bank Systems & Technology January 14, 2009 Maria Bruno-Britz |
Banks' Intellectual Property at Great Risk Amid Layoffs Practices that safeguard employee use of company data must permeate all levels of an organization. |
Bank Systems & Technology March 5, 2010 Penny Crosman |
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. |
IndustryWeek August 1, 2005 John Teresko |
Protecting Intellectual Capital Strategic initiatives such as nanotechnology heighten the need for intellectual property safeguards. Here is a list of steps you can take to protect your company. |
Entrepreneur June 2007 |
In the Know Find out all you can about patents, trademarks and copyrights now - your business will thank you later. |
Information Today May 2005 Phillip Britt |
Protecting Private Information In addition to the separation of security duties, the culture of the company may be one of the most important aspects in protecting sensitive information. |
CIO August 1, 2003 Radcliffe & Rosen |
Patent, Copyright and Trade Secret -- What's the Difference? - The intellectual property in software can be protected three ways: patents, copyrights and trade secrets. |
D-Lib Sep/Oct 2012 Vermaaten et al. |
Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment Digital preservation strategies, as well as the processes and tools that implement those strategies, are designed to secure the long-term future of digital materials. A successful digital preservation strategy must account for and mitigate the impact of various threats. |
Financial Advisor September 2004 David L. Lawrence |
Finding Profit In Written Policies And Procedures The exercise of writing the procedures for a financial practice can reveal ways to trim the process, refine your workflow systems and make things work better in a practice. Freeing up time and that of employee(s) can save money. |
InternetNews March 11, 2005 Erin Joyce |
Bloggers on The Front Lines The Apple trade secrets case has become a defining moment for blogs that practice journalism. |
Entrepreneur November 2009 Gwen Moran |
Social (Networking) Security How to keep your company safe from privacy leaks online. |
CRM September 7, 2012 Dale Dabbs |
Protect Your Most Valuable Business Assets--Your Customers Optimal CRM incorporates data protection best practices to curtail identity theft. |
Insurance & Technology March 16, 2004 Peggy Bresnick-Kendle |
Mobilizing for E-Mail Security Insurers face a myriad of e-mail security issues, from compliance to viruses. Technology is key to the response, whether it's filtering or automating enforcement of corporate policies. |
IndustryWeek August 1, 2003 John Teresko |
Intellectual Property, It's Worth Keeping An Eye On Making sure intellectual property is protected can reap benefits and prevent hassles. |
Real Estate Portfolio Jul/Aug 2002 Kenneth L. Betts |
Avoiding Enron: Counseling the Audit Committee In general, the role of the audit committee is to review the financial operations and statements of a company and to affirm the integrity and accuracy of the preparation and dissemination of that information. Now audit committees need closer observation, support and liability protection. |
IndustryWeek May 18, 2011 |
Social Media: Navigating the Legal Perils A disciplined approach to Facebook, Twitter and other social media helps companies benefit from these networks while minimizing the chances of costly information leaks. |
InternetNews June 29, 2004 Robyn Greenspan |
Spam: Problems Coming and Going While most Internet users deal with the annoyance of unwanted messages in their personal inboxes, corporations are also worrying about confidential data being sent via e-mail and properly managing their e-mail subscriber lists. |
National Defense April 2012 McGrath & Jack |
Publicly Available Information Should Be Promptly Reviewed As of Jan. 3, contractors have seven calendar days to review information after it is posted in the Federal Awardee Performance and Integrity Information System and object to its public release if a Freedom of Information Act exemption applies. |
Inc. October 2005 John Fried |
The Government's Take on E-mail Regulators have thought up lots of rules governing e-mail. It's your job to figure out which ones cover you. |
National Defense February 2016 Denise Brucker |
Carefully Tailor Codes of Conduct A company must be exceptionally careful about the language that it uses in describing and proscribing prohibited behavior to avoid running afoul of federal labor law. |
InternetNews December 8, 2008 Richard Adhikari |
Survey Finds Data Breaches Hit Most Enterprises Despite the growing number of data breaches reported by U.S. businesses, corporate database security is still not up to scratch. Yet many admins and senior management still feel confident in their security precautions. |
InternetNews July 13, 2004 Erin Joyce |
Resistance is Futile. Your E-mail is Being Watched. According to a new survey anyway. At least you know you're not paranoid. |
Information Today March 24, 2011 |
Cornell U Library Issues Statement on Journal Vendor Nondisclosures To promote openness and fairness among libraries licensing scholarly resources, Cornell University Library announced it will not enter into vendor contracts that require nondisclosure of pricing information or other information that does not constitute a trade secret. |
Entrepreneur November 2004 Marc Diener |
Just Zip It A confidentiality agreement can give your business the upper hand. |
Financial Advisor January 2009 Allen Hamm |
Read Carefully Big improvements have come to long-term care insurance, but financial advisors need to be aware that some policies still contain unacceptable restrictions for accessing benefits. |
New Architect May 2002 Bret A. Fausett |
User Ignorance Mending the gaping security hole in your network... |
CIO October 15, 2000 |
Prioritize IT Needs Many businesspeople are familiar with Abraham Maslow's vaunted hierarchy of needs. I propose a similar philosophy in regard to systems management... |
PHONE+ May 1, 2009 Bill Taylor |
Cover Your Assets: Protecting Customer Data Protecting your customer and prospect information is essential and is one of the most important actions you can take to protect your business. So here are four steps you can take to capture and protect your business' most important asset - information! |