![]() ![]() ![]() Additionally, the Company should determine whether multiple copies of the stolen documents exist and whether they have been designated or labeled as confidential or trade secret. The Company should review the information that was taken and determine whether the information was already publically available or whether it contains Company confidential or trade secret information. In coordination with legal counsel, the Company will need to undertake an immediate internal investigation of the employee’s activities. The recent NSA leaks involving contractor Edward Snowden underscore the importance of making sure that your company has an effective action plan in place to protect valuable company data from wannabe whistleblowers. This hypothethical is a scenario faced by employers more often than they would like. Upon further investigation, the supervisor discovers that the employee has asked other employees to also send Company documents to her personal e-mail address. A supervisor discovers that an employee has recently downloaded thousands of pages of confidential Company billing and financial information, and e-mailed it to her personal e-mail address. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |