U.S. charges Snowden with espionage. U.S. defense contractor Edward Snowden discusses his motivation behind the NSA leak and why he revealed himself as the whistleblower behind the major story. Courtesy of Laura Poitras and Glenn Greenwald. (Courtesy of Laura Poitras and Glenn Greenwald) Federal prosecutors have filed a criminal complaint against Edward Snowden, the former National Security Agency contractor who leaked a trove of documents about top-secret surveillance programs, and the United States has asked Hong Kong to detain him on a provisional arrest warrant, according to U.S. officials. Snowden was charged with theft, “unauthorized communication of national defense information” and “willful communication of classified communications intelligence information to an unauthorized person,” according to the complaint. The last two charges were brought under the 1917 Espionage Act. A Justice Department spokeswoman declined to comment.
Snowden, however, can fight the extradition effort in the courts in Hong Kong. HBS Entrepreneurship - Harvard Business School. Duke Human Resources: Confidentiality. Policy Statement During the course of employment, staff may have access to Confidential Information. Any Confidential Information, whether oral, written, or electronic, should be maintained in a manner that ensures its confidentiality. The release of any such Confidential Information may result in negative financial or competitive action, productive loss, or cause legal or other non-beneficial impacts on Duke. Confidential Information must be treated with respect and care by any workforce member who is authorized to have access to this information.
Workforce members who are authorized to use or disclose Confidential Information also have the responsibility to safeguard access to such information. Workforce members who are authorized by Duke to access Confidential Information have a responsibility to limit access to those that are allowed by permission and/or by law. Staff shall comply with the terms of Duke Confidentiality Agreement. Duke is a teaching organization. Policy Details Process. Mondaq Not Allowed - Bad Crawler. Enterprise Information Security Policy | Information Security. Securing data from the threat within. A company? S biggest security threat isn't the sinister hacker trying to break into the corporate network, but employees and partners with easy access to company information. Just ask Apple Computer, which filed two lawsuits in December accusing insiders and partners of leaking proprietary information.
In one case, Apple is suing two men it says distributed prerelease versions of Tiger, the next iteration of Mac OS X. In a separate action, it is suing unnamed individuals who leaked details about a forthcoming music device code-named Asteroid. Apple's not the only company that's found sensitive internal information leaked to the public. "It's much more glamorous to think of the hacker who works for some large cyber-crime ring," said Larry Ponemon, head of the Tuscon, Ariz., think tank. For more than a decade, corporations have erected digital perimeters to keep outsiders off their networks. Securing information from the inside has been largely overlooked by many companies. Data Leakage Worldwide: Common Risks and Mistakes Employees Make. Executive Summary To understand the challenge that increasingly distributed and mobile businesses face in protecting sensitive information, Cisco commissioned third-party market research firm InsightExpress to conduct a study with employees and IT professionals around the world.
As part of the study, surveys were conducted in 10 countries that Cisco selected because of the differences in their social and business cultures. In each country, 100 end users and 100 IT professionals were surveyed, producing a total of 2000 respondents. The research discovered that despite the security policies, procedures, and tools currently in place, employees around the world are engaging in risky behaviors that put corporate and personal data at risk. Employee behaviors included: • Unauthorized application use: 70 percent of IT professionals believe the use of unauthorized programs resulted in as many as half of their companies' data loss incidents.
Introduction In-Depth Survey Exposes Risky Behavior. The Importance of Confidentiality in the Workplace. In today’s increasingly litigious and highly competitive workplace, confidentiality is important for a host of reasons: Failure to properly secure and protect confidential business information can lead to the loss of business/clients. In the wrong hands, confidential information can be misused to commit illegal activity (e.g., fraud or discrimination), which can in turn result in costly lawsuits for the employer.
Many states have laws protecting the confidentiality of certain information in the workplace. The disclosure of sensitive employee and management information can lead to a loss of employee trust, confidence and loyalty. This will almost always result in a loss of productivity. What Type Of Information Must Or Should Be Protected? Confidential workplace information can generally be broken down into three categories: employee information, management information, and business information. The Immigration Form I-9s must also be protected from accidental disclosure. How to effectively protect your company’s confidential information - Smart Business Magazine.
Kate B. Wexler, attorney, Business, Corporate & Securities practice group, Brouse McDowell Think your company has no confidential information that needs to be protected? Think again. “All companies have confidential information which, if compromised, could cause immeasurable damage,” says Kate B. Wexler, an attorney in the Business, Corporate & Securities practice group at Brouse McDowell. “Confidential information can be tangible or intangible and of a technical, business or other nature.”
Wexler says there are occasions where such information needs to be shared with employees, contractors, suppliers, customers, vendors, potential partners and others, and a confidentiality agreement should be put in place to protect the company’s interests. Smart Business spoke with Wexler about confidential information and situations when you might want a confidentiality agreement. What needs to be kept confidential? Under what circumstances would you enter into a confidentiality agreement? Kate B. CFR-2011-title19-vol3-sec201-6.pdf.