SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Protecting Confidential Information




         In the Digital Age
Protecting Trade Secrets


Are You Prepared?
Agenda
• Introduction
• What Is a Trade Secret?
• Protecting Your Trade Secrets
  • Internal and External Threats
• Are You Ready to Litigate?
• Technology to Help
Why is this vital to
      your organization?
   Cost of Design and Implementation
                   vs.
Loss of Trade Secrets and Attorneys Fees

IT IS AN EXPEN$IVE CHOICE!
What is a Trade Secret?
     Minnesota courts identify three statutory elements for trade
     secrets under the MUTSA:

1)     the information must not be generally known or readily
       ascertainable;
2)     the information must derive independent economic value
       from secrecy; and
3)     the plaintiff must make reasonable efforts to maintain the
       secrecy of the information.
Information is Risky
• Internal Risks:
  • Departing Employees
• External Risks
  • Industrial Espionage
Internal Risks:
    Departing Employees
• Non-Compete Agreements or
  Non-Disclosure Agreements
  • Identify the Confidential Information
• Reasonable Protections for Confidential
  Information
  • Passwords, Notifications, and Monitoring
External Risks:
Industrial Espionage
Secure Office Space:
(Reasonable Measures to Limit and Track Access)
•      ID Badges
•      Video
•      Biometrics
External Risks:
Industrial Espionage
  Secure Electronic Data
  • Password Protections
    •Computers at a Minimum
    •Files & Databases
  • Secure Backup
  • Firewalls
  • Secure Wireless
  • Tracking Users Access
Are You Positioned to Legally Protect Your
    Trade Secrets with an Injunction?
    • Can your organization establish the three
      elements necessary to legally enforce
      your trade secrets?
    • Can you prove misappropriation?
      • Who has the information?
      • Was it taken improperly?
      • Is the information being used?
“So, How Can I Do This?”

       Technology
          and
      Legal Advice
Technology to Aid You
Ensure Redundancy
• Off-site Data Backup
  • Backup critical data in the event of loss
  • Backup off-site to protect against fire
  • Keep multiple revisions of documents in the backup
Technology to Aid You
Protect Yourself from Intruders
• Firewall
  • Keep people who don’t belong in your network out
• Intrusion Detection Systems
  • Know and stop intruders when they DO get in
• Anti-Malware Systems
  • Keep Malicious software out of your network
• Secure Wireless Systems
  • Prevent war-driving and other malicious wireless activity
Technology to Aid You
Track User Access
• What if you could…
  • Discover where confidential information is stored
    throughout your network.
  • Monitor where sensitive data travels in and out of
    your network.
  • Protect confidential data and information from
    misuse.
  • Keep of a record of who touched what data, and
    when it occurred.
Technology to Aid You

       Enter…


  Data Security Suite
Q&A


Any Questions?
Thank You!
For Further Questions:
         Benjamin R. Skjold
Litigation & Business Attorney Licensed in MN and IL

              [p] 612.746.2560
              [f] 612.746.2561
              bskjold@skjold-barthel.com
              www.skjold-barthel.com

Contenu connexe

Tendances

Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document SecurityZia Consulting
 
Segurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsSegurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsvalentina jaimes duran
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT OutsourcingMultiTech IT
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilitiesPeter Henley
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintSurfWatch Labs
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Shane Williams
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2Kyle Lai
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security Leo Welder
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small BusinessSYMBIONT, INC.
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss PreventionNicholas Davis
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionNicholas Davis
 

Tendances (20)

Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
 
Segurity and cybersegurity of information systems
Segurity and cybersegurity of information systemsSegurity and cybersegurity of information systems
Segurity and cybersegurity of information systems
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
IoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital FootprintIoT Devices Expanding Your Digital Footprint
IoT Devices Expanding Your Digital Footprint
 
Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc. Network Appliances at Rhino Labs Inc.
Network Appliances at Rhino Labs Inc.
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Data security
Data securityData security
Data security
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
It securities
It securitiesIt securities
It securities
 
10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business10 Quick Cybersecurity Wins for Small Business
10 Quick Cybersecurity Wins for Small Business
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 

En vedette

Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsMichael Scheidell
 
AOC Threat Assessment
AOC Threat Assessment AOC Threat Assessment
AOC Threat Assessment Fabian Zhilla
 
Executive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyExecutive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyChris Moody
 
Open Options Evolutionary Trends
Open  Options    Evolutionary  TrendsOpen  Options    Evolutionary  Trends
Open Options Evolutionary Trendshypknight
 
God's Bride
God's BrideGod's Bride
God's BrideBee Ling
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacificBulletproof
 
AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017AS Solution
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSECRmd Frg
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityCASS Global Security
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities Lawrence Medical Managers
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoplesTrupesh Upadhyay
 

En vedette (16)

Spec Ops Service Overview
Spec Ops Service OverviewSpec Ops Service Overview
Spec Ops Service Overview
 
Spy vs Spy: Protecting Secrets
Spy vs Spy: Protecting SecretsSpy vs Spy: Protecting Secrets
Spy vs Spy: Protecting Secrets
 
AOC Threat Assessment
AOC Threat Assessment AOC Threat Assessment
AOC Threat Assessment
 
THREAT ASSESSMENT IN SCHOOLS
THREAT ASSESSMENT IN SCHOOLSTHREAT ASSESSMENT IN SCHOOLS
THREAT ASSESSMENT IN SCHOOLS
 
Executive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private CompanyExecutive Protection Focus - D&O and EPLI - Private Company
Executive Protection Focus - D&O and EPLI - Private Company
 
Study security-abroad
Study security-abroadStudy security-abroad
Study security-abroad
 
Open Options Evolutionary Trends
Open  Options    Evolutionary  TrendsOpen  Options    Evolutionary  Trends
Open Options Evolutionary Trends
 
God's Bride
God's BrideGod's Bride
God's Bride
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Pacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment PowerpointPacific Bulletproof Threat Assessment Powerpoint
Pacific Bulletproof Threat Assessment Powerpoint
 
AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017AS Solution Capabilities Brief 2017
AS Solution Capabilities Brief 2017
 
OPSEC / PERSEC
OPSEC / PERSECOPSEC / PERSEC
OPSEC / PERSEC
 
Threat Assessment: The New Normal
Threat Assessment: The New NormalThreat Assessment: The New Normal
Threat Assessment: The New Normal
 
International Executive Protection Services | Protective Security
International Executive Protection Services | Protective SecurityInternational Executive Protection Services | Protective Security
International Executive Protection Services | Protective Security
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Security of important peoples
Security of important peoplesSecurity of important peoples
Security of important peoples
 

Similaire à Proprietary Information

Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposureabodiford
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!IBM Security
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureOllie Whitehouse
 

Similaire à Proprietary Information (20)

Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Sensitive Data Exposure
Sensitive Data ExposureSensitive Data Exposure
Sensitive Data Exposure
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
File000154
File000154File000154
File000154
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Cyber
CyberCyber
Cyber
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 

Plus de hypknight

Zeacom Call Center Agent
Zeacom Call Center AgentZeacom Call Center Agent
Zeacom Call Center Agenthypknight
 
Xiotech Storage
Xiotech StorageXiotech Storage
Xiotech Storagehypknight
 
Xiotech Redefining Storage Value
Xiotech   Redefining Storage ValueXiotech   Redefining Storage Value
Xiotech Redefining Storage Valuehypknight
 
V Mware Desktop Virtualization
V Mware   Desktop VirtualizationV Mware   Desktop Virtualization
V Mware Desktop Virtualizationhypknight
 
VMware Cost Savings Through Virtualization
VMware Cost Savings Through VirtualizationVMware Cost Savings Through Virtualization
VMware Cost Savings Through Virtualizationhypknight
 
Toigo Critical Convergence
Toigo  Critical ConvergenceToigo  Critical Convergence
Toigo Critical Convergencehypknight
 
Remote Worker - Road Warrior
Remote Worker - Road WarriorRemote Worker - Road Warrior
Remote Worker - Road Warriorhypknight
 
Nec Executive Knowledge Worker
Nec   Executive Knowledge WorkerNec   Executive Knowledge Worker
Nec Executive Knowledge Workerhypknight
 
Ncompass Uc Budgeting
Ncompass   Uc BudgetingNcompass   Uc Budgeting
Ncompass Uc Budgetinghypknight
 
Milestone Server And Storage Best Practice
Milestone   Server And Storage Best PracticeMilestone   Server And Storage Best Practice
Milestone Server And Storage Best Practicehypknight
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Videohypknight
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliancehypknight
 
Axis The Future Of Ip Video
Axis   The Future Of Ip VideoAxis   The Future Of Ip Video
Axis The Future Of Ip Videohypknight
 
Avaya Unified Communications For Small Business
Avaya   Unified Communications For Small BusinessAvaya   Unified Communications For Small Business
Avaya Unified Communications For Small Businesshypknight
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprisehypknight
 
Avaya Emergency Preparedness Business Continuity
Avaya   Emergency Preparedness   Business ContinuityAvaya   Emergency Preparedness   Business Continuity
Avaya Emergency Preparedness Business Continuityhypknight
 
Avaya Delivering Improved Citizen Service
Avaya   Delivering Improved Citizen ServiceAvaya   Delivering Improved Citizen Service
Avaya Delivering Improved Citizen Servicehypknight
 
Avaya Collaboration
Avaya   CollaborationAvaya   Collaboration
Avaya Collaborationhypknight
 
Avaya Best Practices In Communications Mobility
Avaya   Best Practices In Communications MobilityAvaya   Best Practices In Communications Mobility
Avaya Best Practices In Communications Mobilityhypknight
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Networkhypknight
 

Plus de hypknight (20)

Zeacom Call Center Agent
Zeacom Call Center AgentZeacom Call Center Agent
Zeacom Call Center Agent
 
Xiotech Storage
Xiotech StorageXiotech Storage
Xiotech Storage
 
Xiotech Redefining Storage Value
Xiotech   Redefining Storage ValueXiotech   Redefining Storage Value
Xiotech Redefining Storage Value
 
V Mware Desktop Virtualization
V Mware   Desktop VirtualizationV Mware   Desktop Virtualization
V Mware Desktop Virtualization
 
VMware Cost Savings Through Virtualization
VMware Cost Savings Through VirtualizationVMware Cost Savings Through Virtualization
VMware Cost Savings Through Virtualization
 
Toigo Critical Convergence
Toigo  Critical ConvergenceToigo  Critical Convergence
Toigo Critical Convergence
 
Remote Worker - Road Warrior
Remote Worker - Road WarriorRemote Worker - Road Warrior
Remote Worker - Road Warrior
 
Nec Executive Knowledge Worker
Nec   Executive Knowledge WorkerNec   Executive Knowledge Worker
Nec Executive Knowledge Worker
 
Ncompass Uc Budgeting
Ncompass   Uc BudgetingNcompass   Uc Budgeting
Ncompass Uc Budgeting
 
Milestone Server And Storage Best Practice
Milestone   Server And Storage Best PracticeMilestone   Server And Storage Best Practice
Milestone Server And Storage Best Practice
 
Open Platform and IP Video
Open Platform and IP VideoOpen Platform and IP Video
Open Platform and IP Video
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliance
 
Axis The Future Of Ip Video
Axis   The Future Of Ip VideoAxis   The Future Of Ip Video
Axis The Future Of Ip Video
 
Avaya Unified Communications For Small Business
Avaya   Unified Communications For Small BusinessAvaya   Unified Communications For Small Business
Avaya Unified Communications For Small Business
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
 
Avaya Emergency Preparedness Business Continuity
Avaya   Emergency Preparedness   Business ContinuityAvaya   Emergency Preparedness   Business Continuity
Avaya Emergency Preparedness Business Continuity
 
Avaya Delivering Improved Citizen Service
Avaya   Delivering Improved Citizen ServiceAvaya   Delivering Improved Citizen Service
Avaya Delivering Improved Citizen Service
 
Avaya Collaboration
Avaya   CollaborationAvaya   Collaboration
Avaya Collaboration
 
Avaya Best Practices In Communications Mobility
Avaya   Best Practices In Communications MobilityAvaya   Best Practices In Communications Mobility
Avaya Best Practices In Communications Mobility
 
Aruba Rightsizing Your Network
Aruba Rightsizing Your NetworkAruba Rightsizing Your Network
Aruba Rightsizing Your Network
 

Dernier

FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiSaketCallGirlsCallUs
 
architect Hassan Khalil portfolio Year 2024
architect Hassan Khalil portfolio  Year 2024architect Hassan Khalil portfolio  Year 2024
architect Hassan Khalil portfolio Year 2024hassan khalil
 
FULL NIGHT — 9999894380 Call Girls In Saket | Delhi
FULL NIGHT — 9999894380 Call Girls In Saket | DelhiFULL NIGHT — 9999894380 Call Girls In Saket | Delhi
FULL NIGHT — 9999894380 Call Girls In Saket | DelhiSaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | Delhi
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | DelhiFULL NIGHT — 9999894380 Call Girls In Dwarka Mor | Delhi
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | DelhiSaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiSaketCallGirlsCallUs
 
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls AgencyHire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls AgencyNitya salvi
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design projecttbatkhuu1
 
Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingBarasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingNitya salvi
 
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiFULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiSaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | DelhiFULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | DelhiSaketCallGirlsCallUs
 
THE ARTS OF THE PHILIPPINE BALLET PRESN
THE ARTS OF  THE PHILIPPINE BALLET PRESNTHE ARTS OF  THE PHILIPPINE BALLET PRESN
THE ARTS OF THE PHILIPPINE BALLET PRESNAlvinFerdinandAceCas
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiSaketCallGirlsCallUs
 
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service AvailableMoradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service AvailableNitya salvi
 
AaliyahBell_themist_v01.pdf .
AaliyahBell_themist_v01.pdf             .AaliyahBell_themist_v01.pdf             .
AaliyahBell_themist_v01.pdf .AaliyahB2
 
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiSaketCallGirlsCallUs
 
Storyboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to SingStoryboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to SingLyneSun
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶delhimunirka444
 
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | DelhiSaketCallGirlsCallUs
 

Dernier (20)

FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
 
UAE Call Girls # 971526940039 # Independent Call Girls In Dubai # (UAE)
UAE Call Girls # 971526940039 # Independent Call Girls In Dubai # (UAE)UAE Call Girls # 971526940039 # Independent Call Girls In Dubai # (UAE)
UAE Call Girls # 971526940039 # Independent Call Girls In Dubai # (UAE)
 
architect Hassan Khalil portfolio Year 2024
architect Hassan Khalil portfolio  Year 2024architect Hassan Khalil portfolio  Year 2024
architect Hassan Khalil portfolio Year 2024
 
FULL NIGHT — 9999894380 Call Girls In Saket | Delhi
FULL NIGHT — 9999894380 Call Girls In Saket | DelhiFULL NIGHT — 9999894380 Call Girls In Saket | Delhi
FULL NIGHT — 9999894380 Call Girls In Saket | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | Delhi
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | DelhiFULL NIGHT — 9999894380 Call Girls In Dwarka Mor | Delhi
FULL NIGHT — 9999894380 Call Girls In Dwarka Mor | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
 
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls AgencyHire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls Agency
Hire 💕 8617370543 Mumbai Suburban Call Girls Service Call Girls Agency
 
Editorial sephora annual report design project
Editorial sephora annual report design projectEditorial sephora annual report design project
Editorial sephora annual report design project
 
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
 
Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingBarasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiFULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | DelhiFULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
 
THE ARTS OF THE PHILIPPINE BALLET PRESN
THE ARTS OF  THE PHILIPPINE BALLET PRESNTHE ARTS OF  THE PHILIPPINE BALLET PRESN
THE ARTS OF THE PHILIPPINE BALLET PRESN
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
 
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service AvailableMoradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
 
AaliyahBell_themist_v01.pdf .
AaliyahBell_themist_v01.pdf             .AaliyahBell_themist_v01.pdf             .
AaliyahBell_themist_v01.pdf .
 
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
 
Storyboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to SingStoryboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to Sing
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
 
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
 

Proprietary Information

  • 3. Agenda • Introduction • What Is a Trade Secret? • Protecting Your Trade Secrets • Internal and External Threats • Are You Ready to Litigate? • Technology to Help
  • 4. Why is this vital to your organization? Cost of Design and Implementation vs. Loss of Trade Secrets and Attorneys Fees IT IS AN EXPEN$IVE CHOICE!
  • 5. What is a Trade Secret? Minnesota courts identify three statutory elements for trade secrets under the MUTSA: 1) the information must not be generally known or readily ascertainable; 2) the information must derive independent economic value from secrecy; and 3) the plaintiff must make reasonable efforts to maintain the secrecy of the information.
  • 6. Information is Risky • Internal Risks: • Departing Employees • External Risks • Industrial Espionage
  • 7. Internal Risks: Departing Employees • Non-Compete Agreements or Non-Disclosure Agreements • Identify the Confidential Information • Reasonable Protections for Confidential Information • Passwords, Notifications, and Monitoring
  • 8. External Risks: Industrial Espionage Secure Office Space: (Reasonable Measures to Limit and Track Access) • ID Badges • Video • Biometrics
  • 9. External Risks: Industrial Espionage Secure Electronic Data • Password Protections •Computers at a Minimum •Files & Databases • Secure Backup • Firewalls • Secure Wireless • Tracking Users Access
  • 10. Are You Positioned to Legally Protect Your Trade Secrets with an Injunction? • Can your organization establish the three elements necessary to legally enforce your trade secrets? • Can you prove misappropriation? • Who has the information? • Was it taken improperly? • Is the information being used?
  • 11. “So, How Can I Do This?” Technology and Legal Advice
  • 12. Technology to Aid You Ensure Redundancy • Off-site Data Backup • Backup critical data in the event of loss • Backup off-site to protect against fire • Keep multiple revisions of documents in the backup
  • 13. Technology to Aid You Protect Yourself from Intruders • Firewall • Keep people who don’t belong in your network out • Intrusion Detection Systems • Know and stop intruders when they DO get in • Anti-Malware Systems • Keep Malicious software out of your network • Secure Wireless Systems • Prevent war-driving and other malicious wireless activity
  • 14. Technology to Aid You Track User Access • What if you could… • Discover where confidential information is stored throughout your network. • Monitor where sensitive data travels in and out of your network. • Protect confidential data and information from misuse. • Keep of a record of who touched what data, and when it occurred.
  • 15. Technology to Aid You Enter… Data Security Suite
  • 17. Thank You! For Further Questions: Benjamin R. Skjold Litigation & Business Attorney Licensed in MN and IL [p] 612.746.2560 [f] 612.746.2561 bskjold@skjold-barthel.com www.skjold-barthel.com