background preloader


Facebook Twitter

U.S. charges Snowden with espionage. U.S. defense contractor Edward Snowden discusses his motivation behind the NSA leak and why he revealed himself as the whistleblower behind the major story.

U.S. charges Snowden with espionage

Courtesy of Laura Poitras and Glenn Greenwald. (Courtesy of Laura Poitras and Glenn Greenwald) Federal prosecutors have filed a criminal complaint against Edward Snowden, the former National Security Agency contractor who leaked a trove of documents about top-secret surveillance programs, and the United States has asked Hong Kong to detain him on a provisional arrest warrant, according to U.S. officials. Snowden was charged with theft, “unauthorized communication of national defense information” and “willful communication of classified communications intelligence information to an unauthorized person,” according to the complaint.

The last two charges were brought under the 1917 Espionage Act. A Justice Department spokeswoman declined to comment. HBS Entrepreneurship - Harvard Business School. Duke Human Resources: Confidentiality. Policy Statement During the course of employment, staff may have access to Confidential Information.

Duke Human Resources: Confidentiality

Any Confidential Information, whether oral, written, or electronic, should be maintained in a manner that ensures its confidentiality. The release of any such Confidential Information may result in negative financial or competitive action, productive loss, or cause legal or other non-beneficial impacts on Duke. Confidential Information must be treated with respect and care by any workforce member who is authorized to have access to this information.

Workforce members who are authorized to use or disclose Confidential Information also have the responsibility to safeguard access to such information. Staff shall comply with the terms of Duke Confidentiality Agreement. Duke is a teaching organization. Policy Details Confidentiality Agreement All Duke staff must sign the Duke Confidentiality Agreement. Definitions Identifying Information: Identifying Information: Includes the following: Process. Mondaq Not Allowed - Bad Crawler. Enterprise Information Security Policy. Securing data from the threat within. A company?

Securing data from the threat within

S biggest security threat isn't the sinister hacker trying to break into the corporate network, but employees and partners with easy access to company information. Just ask Apple Computer, which filed two lawsuits in December accusing insiders and partners of leaking proprietary information. In one case, Apple is suing two men it says distributed prerelease versions of Tiger, the next iteration of Mac OS X. In a separate action, it is suing unnamed individuals who leaked details about a forthcoming music device code-named Asteroid. Apple's not the only company that's found sensitive internal information leaked to the public.

"It's much more glamorous to think of the hacker who works for some large cyber-crime ring," said Larry Ponemon, head of the Tuscon, Ariz., think tank. For more than a decade, corporations have erected digital perimeters to keep outsiders off their networks. Securing information from the inside has been largely overlooked by many companies. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. Executive Summary To understand the challenge that increasingly distributed and mobile businesses face in protecting sensitive information, Cisco commissioned third-party market research firm InsightExpress to conduct a study with employees and IT professionals around the world.

Data Leakage Worldwide: Common Risks and Mistakes Employees Make

As part of the study, surveys were conducted in 10 countries that Cisco selected because of the differences in their social and business cultures. In each country, 100 end users and 100 IT professionals were surveyed, producing a total of 2000 respondents. The research discovered that despite the security policies, procedures, and tools currently in place, employees around the world are engaging in risky behaviors that put corporate and personal data at risk. Employee behaviors included: • Unauthorized application use: 70 percent of IT professionals believe the use of unauthorized programs resulted in as many as half of their companies' data loss incidents. Introduction In-Depth Survey Exposes Risky Behavior.

The Importance of Confidentiality in the Workplace. In today’s increasingly litigious and highly competitive workplace, confidentiality is important for a host of reasons: Failure to properly secure and protect confidential business information can lead to the loss of business/clients.

The Importance of Confidentiality in the Workplace

In the wrong hands, confidential information can be misused to commit illegal activity (e.g., fraud or discrimination), which can in turn result in costly lawsuits for the employer. Many states have laws protecting the confidentiality of certain information in the workplace. The disclosure of sensitive employee and management information can lead to a loss of employee trust, confidence and loyalty. This will almost always result in a loss of productivity. What Type Of Information Must Or Should Be Protected?

How to effectively protect your company’s confidential information - Smart Business Magazine. Kate B.

How to effectively protect your company’s confidential information - Smart Business Magazine

Wexler, attorney, Business, Corporate & Securities practice group, Brouse McDowell Think your company has no confidential information that needs to be protected? Think again. “All companies have confidential information which, if compromised, could cause immeasurable damage,” says Kate B. Wexler, an attorney in the Business, Corporate & Securities practice group at Brouse McDowell. Wexler says there are occasions where such information needs to be shared with employees, contractors, suppliers, customers, vendors, potential partners and others, and a confidentiality agreement should be put in place to protect the company’s interests.

Smart Business spoke with Wexler about confidential information and situations when you might want a confidentiality agreement. CFR-2011-title19-vol3-sec201-6.pdf.