Tag Archive for Intellectual property

25% of Employees Access Past Employers Work Docs

25% of Employees Access Past Employers Work Doc'sMore than 25% of file-sharing service users report still having access to work documents from their previous employer, according to a “Rogue Cloud in Business” survey of 2,000 U.S. adults by Harris Interactive for Egnyte, an enterprise file-sharing platform provider.

uncontrolled file-sharingAccording to FierceITSecurity, the survey highlights the security risks uncontrolled file-sharing practices pose to the work place from these practices are obvious. An Egnyte presser claims The survey results illustrate a major exposure for today’s businesses when it comes to the transfer and storage of data through unapproved and insecure cloud-only file-sharing services.

The new survey uncovers deep issues around the rogue usage of consumer-based cloud services and illustrates the need for IT to deploy a secure enterprise-grade solution that meets the file-sharing needs of employees while protecting sensitive business data from the risks associated with insecure file sharing through the cloud

The survey found that:

  • easy to take sensitive business documents51% agree that collaborating on file-sharing services (such as Dropbox and YouSendIt) is secure for work documents;
  • 46% agree that it would be easy to take sensitive business documents to another employer;
  • 41% agree that they could easily transfer business-sensitive data outside the company using a file-sharing service;
  • 38% have used file-sharing services have transferred sensitive files on an unapproved file-sharing service to someone else at least once; 10% have done it 6 or more times;
  • 31% agree that they would share large documents that are too big for email through a file-sharing service without checking with their IT departments;
  • 27% of file-share service users report still having access to documents from that previous employer.

mobile users are willing to bypass IT policiesAnother report from Workshare paints a grimmer picture for those of us tasked with protecting a firm’s intellectual property. The report titled “Workforce Mobilization” shows the true extent to which mobile users are willing to bypass IT policies and use unsanctioned applications to share large files and collaborate on documents outside of the office.

  • 72% of workers are using free file-sharing services without authorization from their IT departments.
  • 62% of knowledge workers use their personal devices for work.
  • 69% of these workers also use free file sharing services to collaborate and access shared documents.
  • At companies with fewer than 500 employees only 24% of employees using authorized file sharing solutions.

Robert Hamilton, director of information risk management at Symantec (SYMC) in Mountain View, CA also told FierceCIO a continued threat to the company’s data comes from employees who feel like they live in a “finder’s keepers” environment.

Not encouraging

The results of the survey report, entitled “What’s Yours Is Mine,” were not encouraging to IT security professionals and IT management. According to the Symantec survey of employees:

  • "finder's keepers" environment68% of their company doesn’t take proper steps to protect sensitive work information;
  • 56% do not believe it is a crime to use a competitor’s trade secrets;
  • 40% download work files to personal devices;
  • 40% plan to use old company information in a new job role.

Symantec’s Hamilton told FierceCIO:

Employees are taking increasing amounts of data outside the company, and most people do not believe using corporate data for themselves is wrong … The attitude is that ownership lies with the person that created it, not with the company that employs them.

rb-

All three of these firms sell products they claim that can stop a firm’s intellectual property from leaking out through public file-sharing services. But before you engage any firm, some basic steps should be taken.

  1. Develop a technology acceptable use policy.
  2. Include public file-sharing services in the AUP.
  3. Incorporate the AUP in the staff handbook, and make sure staff sign it before they are given network access.
  4. Train staff on the risks associated with using public file sharing services for sharing corporate documents. Risks include HIPAA violations, PII release, Malware, PCI-DSS violations, and Government “Snooping.” Only then –
  5. Engage a service provider to implement an enterprise-approved alternative to the free file-sharing services.
What's Your is Mine

Symantec Infographic

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

US Internet Laws Unequally Enforced

US Internet Laws Unequally EnforcedThe Internet Society (ISOC) provides a summary of a report from the Fordham Center on Law and Information Policy (CLIP), entitled “Internet Jurisdiction: A Survey of Legal Scholarship Published in English and United States Case Law” (PDF) examining the case-law and legal literature analyzing jurisdiction for claims arising out of Internet activity in the United States. The report finds that despite definitive case law, the practice of U.S. courts “lacks uniformity”.

Internet SocietyThe report concludes that U.S. Internet law jurisdictions are typically set by the Second and Ninth Circuit Courts. The Second Court covers New York, Vermont, and Connecticut. The Ninth Court covers the west coast of the US from Alaska to California and from Hawaii to Montana.

The CLIP research found that the most frequent Internet jurisdiction issues addressed by the courts are intellectual property and defamation cases. According to Wikipedia, Intellectual property (IP) is a legal concept that refers to creations of the mind for which exclusive rights are recognized. Under IP law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, discoveries and inventions; and words, symbols, and designs. Common types of intellectual property rights include copyright, trademarks, patents, and in some jurisdictions trade secrets. (rb- I have written a great deal about IP in my Patent Trolling articles.)

intentional tortThe researchers found that 62% of Internet jurisdiction cases centered on disputes about intellectual property. Specifically, 43% of the cases related to trademarks; 20% related to copyright; and 9% related to patents.

Within the Fordham data. There were also 35 defamation cases studied with 23% of these cases related to the intentional tort. Wikipedia defines defamation as communicating a false statement that harms an individual, business, product, group, government, religion, or nations’ reputation. Under common law, to constitute defamation, a claim must generally be false and made to someone other than the person defamed.’

Internet jurisdiction casesAccording to the Fordham research, there are two primary cases the courts use to address most Internet jurisdiction cases, The first is Zippo Manufacturing Co. v. Zippo Dot Com, Inc. IT Law Wiki explains that Zippo created a three-prong test for determining whether a court has jurisdiction over a website. Under this test, there are three types of websites: Commercial, Passive, and Interactive.

Interactive websites allow the exchange of information between the website owner and visitors, may be subject to the jurisdiction, depending on the website’s level of interactivity and commerciality, and the number of contacts which the website owner has developed with the forum due to the availability of the website within the jurisdiction.

knowledge that his intentional conduct would cause harmThe other key case that Fordham found was Calder v. Jones. IT Law Wiki writes  that this case resulted in the “effects test.” The article asserts, “… virtually every jurisdiction has held that the Calder effects test requires intentional conduct expressly aimed at or targeting the forum state in addition to the defendant’s knowledge that his intentional conduct would cause harm in the forum.

The article concludes that the Zippo and Calder tests remain the dominant ones applied, but that these tests are not mutually exclusive. Although Zippo is most often applied in matters of specific jurisdiction, there exists a varied and, at times, a blurred framework that incorporates the Zippo sliding scale and Calder’s effects test, as well as traditional standards for personal jurisdiction. Therefore, although the landscape for Internet jurisdiction matters has clear, predominant legal standards and tests, on the whole, when and how these are applied by U.S. courts lacks uniformity.

rb-

I am not a lawyer, and of course, you should seek the advice of an attorney.

While I am not a lawyer, I do have common sense and how is it possible for different courts to rule in different ways on the same topic when they have InnerTubes to rule consistently?

conservative nature of the legal professionI believe this shows how out of touch the law is from technology.

Some of this could be due to the basic conservative nature of the legal profession.

I also believe that there is money in it for the politicians to make laws that are so confusing that lawyers are needed to understand the law. After all most Senators are lawyers.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Michigan Woman Busted for Selling $400K+ in Illegal Software

Michigan DarkReading reports that a Michigan woman pled guilty to selling more than $400,000 worth of counterfeit computer software. The conviction was announced by Assistant Attorney General of the Criminal Division Lanny A. Breuer and U.S. Attorney Barbara L. McQuade for the Eastern District of Michigan. The report says Jacinda Jones, 31, of Ypsilanti, Mich., pled guilty to one count of willful copyright infringement before U.S. District Judge David M. Lawson in Detroit.

IP TheftDarkreading cites court documents which say, between July 2008 and January 2010, Ms. Jones earned more than $400,000 by selling over 7,000 copies of pirated business software at discounted prices through the website www.cheapdl.com (which no longer appears active). The Business Software Alliance (BSA) says that Ms. Jones also used Cheapsoftwaredownloads.net, and JJ’s Discount Electronics (jjsdiscountelectronics.com) for her activities as well.

The software in question was from Microsoft (MSFT), Adobe (ADBE), Intuit (INTU) and Symantec (SYMC) had a retail value of more than $2 million. According to court documents cited by Darkreading,  Ms. Jones’ activities came to the attention of U.S. Immigration and Customs Enforcement (ICE) agents, who made several undercover purchases of the pirated business and utility software.

At sentencing, Ms. Jones faces maximum penalties of five years in prison, a $250,000 fine, and three years of supervised release. During her guilty plea hearing, the article says Ms. Jones also agreed to forfeit any illegal proceeds from her criminal activity and pay restitution to the victims. Sentencing has been scheduled for Aug. 15, 2011, at 9 a.m.

The post says Assistant U.S. Attorney Terrence Berg of the U.S. Attorney’s Office for the Eastern District of Michigan and Trial Attorney Thomas Dougherty of the Criminal Division’s Computer Crime and Intellectual Property Section are prosecuting the case. The Field Support Unit of the National Intellectual Property Rights Coordination Center (IPR Center) and by ICE’s Office of Homeland Security Investigations in Detroit conducted the investigation.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.