INFORMATION

Site Map - Proprietary Information Protection

The Quiet Threat: Fighting Industrial Espionage in America

- This second edition updates its treatment of the topic with additions on tradecraft of the industrial spy and data mining of business information.

Economic Espionage

- A recent court ruling found that a former Goldman Sachs employee who stole code for a proprietary internal trading system did not violate the Economic Espionage Act because the code was for an internal system.

The Quiet Threat: Fighting Industrial Espionage in America, 2nd Edition

- Ronald Mendell explains governmental spying and how it differs from industrial espionage, with the latter being the primary focus of this work.

Morning Security Brief: Data Breach Notification, IPv6 Launches Worldwide, Arson Mystery at WSU, and More

- Consumers are unhappy with data breach notifications. IPv6 launches. Washington State University sees it fourth arson in two weeks. And more.

FBI Publishes Tips to Recognize the Company Mole

- The FBI says employees who leak trade secrets and other sensitive information often exhibit behaviors co-workers can pick up on to prevent such breaches.

Trade Secrets

- A New Jersey law (formerly A.B. 921) establishes the protection of trade secrets and establishes penalties for violation of the law. The law is a version of the Uniform Trade Secrets Act, adopted by most U.S. states. (New York, North Carolina, Massachusetts, and Texas are the only states that have yet to adopt a similar law.)

Economic Espionage

- A bill (S. 678) that would increase penalties for economic espionage has been approved by the Senate Judiciary Committee. To proceed, the bill must now be taken up by the full Senate.

Economic Espionage

- A bill (S. 678) that would increase penalties for economic espionage has been approved by the Senate Judiciary Committee. To proceed, the bill must now be taken up by the full Senate.

Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks

- The book familiarizes readers with terms such as “silent slashes,” “evil clones,” and “jihad by proxy” as the authors describe the “seven swords of digital assassination” that damage entities’ reputations.

CHART: How Companies Protect Sensitive Information

- See the steps companies are taking to protect data.

Trade Secret Protection

- Nearly every business has trade secrets, and management must have a program for protecting those assets to reduce risk exposure to the enterprise.

Economic Espionage

- A bill (S. 678) introduced by Sen. Herb Kohl (D-WI) would increase penalties for economic espionage. The bill would also require that the U.S Sentencing Commission consider a tiered system to address different types of espionage.

More Than Four Million Hold U.S. Security Clearances

- According to a report from the Director of National Intelligence, more than one million federal employees hold top secret clearances. The total number of people holding security clearances last year exceeded 4.2 million.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.