This preview shows page 1. Sign up to view the full content.
Unformatted text preview: The Economic Espionage Act of
1996 provides the necessary structure when dealing with these types of cases and
further defines trade secrets to be technical, business, engineering, scientific, or financial. This means that an asset does not necessarily need to be tangible to be protected
or be stolen. Thus, this act enables the FBI to investigate industrial and corporate espionage cases. Employee Privacy Issues
Within a corporation, several employee privacy issues must be thought through and
addressed if the company wants to be properly protected. An understanding that each
state and country may have different privacy laws should prompt the company to investigate exactly what it can and cannot monitor before it does so.
If a company has learned that the state the facility is located in permits keyboard,
e-mail, and surveillance monitoring, it must take the proper steps to ensure that the
employees know that these types of monitoring may be put into place. This is the best
way for a company to protect itself, make sure it has a legal leg to stand on if necessary,
and not present the employees with any surprises.
The monitoring must be work related, meaning that a manager may have the right
to listen in on his employees’ conversations with customers, but he does not have the
right to listen in on personal conversations that are not work related. Monitoring also
must happen in a consistent way, such that all employees are subjected to monitoring,
not just one or two people. Review on Ways of Dealing with Privacy
Current methods of privacy protection and examples are listed next:
• Government regulations SOX, HIPAA, GLBA, BASEL
• Self-regulation Payment Card Industry (PCI)
• Individual user Passwords, encryption, awareness ch10.indd 872 12/4/2009 11:39:09 AM All-in-1 / CISSP All-in-One Exam Guide, 5th Ed. / Harris / 160217-8 Chapter 10: Legal, Regulations, Compliance, and Investigations 873
Chapter 3 described why it is important to properly screen individuals before hir...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12