Protecting Intellectual Property & Data Loss Prevention

45
Protecting Intellectual Protecting Intellectual Property and Data Loss Property and Data Loss Prevention Prevention Are your competitive differentiators Are your competitive differentiators and client lists walking out the door? and client lists walking out the door? Protect your competitive advantage! Protect your competitive advantage! * Second in a series of Informational Breakfast Events with topics of timely and valuable information for small and Second in a series of Informational Breakfast Events with topics of timely and valuable information for small and medium size business owners and organization leaders medium size business owners and organization leaders Informational Breakfast Meeting* nsored by: Boston Business Alliance www.BostonBusinessAlliance.com September 23, 2009 – 7:00-9:00 AM September 23, 2009 – 7:00-9:00 AM 800 W. Cummings Park, Suite 4750 800 W. Cummings Park, Suite 4750 Woburn, MA 01801 Woburn, MA 01801

description

Presentation to the Boston Business Alliance

Transcript of Protecting Intellectual Property & Data Loss Prevention

Page 1: Protecting Intellectual Property & Data Loss Prevention

Protecting Intellectual Property and Protecting Intellectual Property and Data Loss PreventionData Loss Prevention

Are your competitive differentiators and client Are your competitive differentiators and client lists walking out the door?lists walking out the door?

Protect your competitive advantage!Protect your competitive advantage!

** Second in a series of Informational Breakfast Events with topics of timely and valuable information for Second in a series of Informational Breakfast Events with topics of timely and valuable information for small and medium size business owners and organization leaderssmall and medium size business owners and organization leaders

Informational Breakfast Meeting*Sponsored by: Boston Business Alliance

www.BostonBusinessAlliance.com

September 23, 2009 – 7:00-9:00 AMSeptember 23, 2009 – 7:00-9:00 AM800 W. Cummings Park, Suite 4750800 W. Cummings Park, Suite 4750

Woburn, MA 01801Woburn, MA 01801

Page 2: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 22

AgendaAgenda

7:007:00 Coffee and NetworkingCoffee and Networking

7:157:15 Intellectual Property (IP) – What is it and how do you protect it?Intellectual Property (IP) – What is it and how do you protect it?(Attorney Vern Maine)(Attorney Vern Maine)

8:008:00 Information and Data Loss PreventionInformation and Data Loss Prevention(Bob Carroll, Consultant)(Bob Carroll, Consultant)

8:458:45 Questions and AnswersQuestions and AnswersSpeakers available for questionsSpeakers available for questions

9:009:00 AdjournAdjourn

Page 3: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 33

SponsorsSponsors

Website Sponsor:

TechevolutionContact: Corey TapperPhone: 781-595-2040www.techevolution.com

Facilities/Location Sponsor:

Sunbelt Business Sales & AcquisitionsContact: Mariola AndoniPhone: 781-932-7355www.sunbeltne.com

Refreshment Sponsor:

Analytix SolutionsContact: Jason LefterPhone: 781-503-9000www.analytixsolutions.com

Page 4: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 44

Moderator and SpeakersModerator and Speakers

For more information about the event or Boston Business Alliance, go to:www.BostonBusinessAlliance.com

Bob CarrollBob Carroll has more than 20 years experience in information technology, business consulting, data services and engineering. He has been a key contributor on projects running the gamut from the B-2 Stealth Bomber to improving student performance in New England public and private schools. His work involves selecting and implementing next generation strategies, methodologies, and technologies for clients. Most recently, Bob is focused on Data Loss Prevention, Security and Regulatory Compliance, such as Mass 201 CMR 17.00 for private sector business and public sector, such as schools and local government. See www.bobcarrollconsultant.com

Vern MaineVernon Maine, of Vern Maine & Associates, leaders in intellectual property strategies and law. Founder and managing partner of the firm. Registered to practice in New Hampshire, Massachusetts, and New York, and before the U.S. Patent and Trademark Office and the Court of Appeals for the Federal Circuit. Founded the practice in 1993, providing legal counseling, services and seminars on intellectual property and business law, including U.S. provisional, utility, and design patents, PCT patent applications, trademarks, copyrights, trade secrets, licensing, infringement, contracts, and related business matters. For more info, www.vernmaine.com

Ray Arpin - ModeratorRay Arpin has 30 years of experience working with small companies and start-ups, to Fortune 10, Global 2000, state and federal organizations, in a wide variety of industries and segments. His specialty is business process improvement to increase sales and reduces costs, professional services, and regulatory compliance. Most recently, he is focused on helping companies and individuals quickly apply business best practices, and specifically to become compliant with personal identity security regulations and MA 201 CMR 17.00. For more information, www.rayarpin.com

Page 5: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 55

Possible Implications and Why be Possible Implications and Why be Concerned?Concerned?

Intellectual Property Intellectual Property – most business owners have invested their unique knowledge, experience, – most business owners have invested their unique knowledge, experience, and creativity in their business – that should be treated as and creativity in their business – that should be treated as propertyproperty and should be protected from and should be protected from competitorscompetitors

Trade SecretsTrade Secrets OUTED –OUTED – What if your confidential business deal with another company to exploit What if your confidential business deal with another company to exploit your newly developed technology is scuttled before it is announced because a competitor got wind your newly developed technology is scuttled before it is announced because a competitor got wind of it and made the other party a better offer for the same technology? of it and made the other party a better offer for the same technology?

InfringingInfringing – What happens if you get a “Cease and Desist” letter from a lawyer saying you must – What happens if you get a “Cease and Desist” letter from a lawyer saying you must stop using your trademark, or that your production method is infringing their patent, or that your stop using your trademark, or that your production method is infringing their patent, or that your website or marketing collateral are using their copyright protected materials?website or marketing collateral are using their copyright protected materials?

InfringedInfringed – What happens if your competitor launches a new service using a trademark similar to – What happens if your competitor launches a new service using a trademark similar to yours? What if a competitor launches a new website and it has clearly copied images or text from yours? What if a competitor launches a new website and it has clearly copied images or text from your website? What if you just invented a new gizmo and filed a patent application and are your website? What if you just invented a new gizmo and filed a patent application and are investing to get it into production, and your competitor comes out with a product just like it?investing to get it into production, and your competitor comes out with a product just like it?

Employee ObligationsEmployee Obligations – What control do you have over an employee’s intellectual contributions – What control do you have over an employee’s intellectual contributions and confidentiality during and after his or her employment ends?and confidentiality during and after his or her employment ends?

Data [Information] LossData [Information] Loss – important and confidential information may be walking out the door or – important and confidential information may be walking out the door or even unintentionally leaked to others; even competitors – such as client lists or informationeven unintentionally leaked to others; even competitors – such as client lists or information

ComplianceCompliance – HIPAA in health and benefits, FTC ‘Red Flags Rule’, GLBA and BASEL II in finance, – HIPAA in health and benefits, FTC ‘Red Flags Rule’, GLBA and BASEL II in finance, MASS. 201 CMT 17.00, Electronic Medical records – all require protection of data/informationMASS. 201 CMT 17.00, Electronic Medical records – all require protection of data/information

Data Loss during Downsizing Data Loss during Downsizing – As employees exit, does the corporate data? What about loss by – As employees exit, does the corporate data? What about loss by way of temporary or contract help?way of temporary or contract help?

Possible FinesPossible Fines – $5,000 per occurrence, and/or per person effected or compromised; in addition to – $5,000 per occurrence, and/or per person effected or compromised; in addition to a basis for a law suit, bad publicity, and other serious risksa basis for a law suit, bad publicity, and other serious risks

Professional Malpractice RisksProfessional Malpractice Risks – if you are an attorney, CPA, doctor, or any other professional, – if you are an attorney, CPA, doctor, or any other professional, did you know that you are at risk for a malpractice lawsuit if you fail to adequately protect client did you know that you are at risk for a malpractice lawsuit if you fail to adequately protect client information?information?

Page 6: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 66

What is Intellectual Property?What is Intellectual Property?

KnowledgeKnowledge and/or and/or ExpressionExpression conceived, created or constructed conceived, created or constructed by a person or entity.by a person or entity.

Some protectable by Some protectable by NOTICENOTICE and and REGISTRATIONREGISTRATION, e.g. patents, , e.g. patents, trademarks, copyright.trademarks, copyright.

Some protectable only by Some protectable only by SECRECYSECRECY and/or and/or CONTRACTSCONTRACTS..

Some protected by Some protected by LAWLAW..

Page 7: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 77

Elements of Intellectual PropertyElements of Intellectual PropertyElements of Intellectual PropertyElements of Intellectual Property TrademarksTrademarks

CopyrightCopyright

Design & Utility PatentsDesign & Utility Patents

Trade SecretsTrade Secrets

What’s in your IP portfolio?What’s in your IP portfolio?

TrademarksTrademarks

CopyrightCopyright

Design & Utility PatentsDesign & Utility Patents

Trade SecretsTrade Secrets

What’s in your IP portfolio?What’s in your IP portfolio?

Page 8: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 88

WHY IP? WHY IP? WHY NOW?WHY NOW?

IP Strategies help IP Strategies help drive the Business drive the Business Plan!Plan!

Page 9: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 99

Trademarks – Source IdentifiersTrademarks – Source Identifiers

A word, phrase, symbol or design, A word, phrase, symbol or design, sound, smell, or combination.sound, smell, or combination.

E.G., NBC chimes, Pink Fiberglass, Nike E.G., NBC chimes, Pink Fiberglass, Nike swoosh, golden arches, Harley sound, swoosh, golden arches, Harley sound, Microsoft graphics, Apple for Microsoft graphics, Apple for computers, Target for department computers, Target for department stores.stores.

Notice: Notice: ™™ symbol after the marksymbol after the mark Federal reg: – use the Federal reg: – use the ®® symbol. symbol.

Page 10: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1010

Trademarks – 5 steps to protectionTrademarks – 5 steps to protection

#1 Choose a defensible mark.#1 Choose a defensible mark.

#2 Clear the mark.#2 Clear the mark.

#3 Apply common-law Notice and/or #3 Apply common-law Notice and/or register.register.

#4 Use the mark correctly.#4 Use the mark correctly.

#5 Police the Mark#5 Police the Mark

Page 11: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1111

CopyrightCopyright

Protects EXPRESSION, not idea)Protects EXPRESSION, not idea)

NOTICE:NOTICE:

©© or or Copyright 2008, XYZ Inc.Copyright 2008, XYZ Inc.

Federal Registration available.Federal Registration available.

Best IP Bang for the Buck!Best IP Bang for the Buck!

File within 3 months of publication.File within 3 months of publication.

www.copyright.govwww.copyright.gov

Page 12: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1212

Copyright OwnershipCopyright Ownership

1) author/artist or its employer unless 1) author/artist or its employer unless independent contractor independent contractor

2) joint or co-ownership 2) joint or co-ownership

3) work for hire3) work for hire

ALWAYS use Written Agreements ALWAYS use Written Agreements conveying ownership of copyright in conveying ownership of copyright in important works.important works.

Page 13: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1313

What Is a What Is a PATENTPATENT??

Right to Exclude (SUE) others from: Right to Exclude (SUE) others from: – MakingMaking– UsingUsing– Selling, Offer to sellSelling, Offer to sell– ImportingImporting

……the Patented Invention!the Patented Invention! 20-21 year term. 20-21 year term. Quid pro quo?Quid pro quo?

NoTrespassing!

Page 14: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1414

What Can Be Patented?What Can Be Patented?

What Should Be Patented?What Should Be Patented?

Page 15: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1515

Design PatentsDesign Patentsversusversus

Utility PatentsUtility Patents

Appearance of Articles of ManufactureAppearance of Articles of Manufacture Structure or Functionality of Methods and Structure or Functionality of Methods and

MachinesMachines

Page 16: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1616

Priority Dates andPriority Dates andForeign Filing RightsForeign Filing Rights

• First to file vs. First to InventFirst to file vs. First to Invent

• U.S. Provisional Patent Applications. U.S. Provisional Patent Applications.

• Patent Cooperation Treaty Patent Cooperation Treaty applications preserve right to file in applications preserve right to file in over 130 countries, including U.S.over 130 countries, including U.S.

• Regional filing opportunities.Regional filing opportunities.

Page 17: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1717

PATENT INFRINGMENTPATENT INFRINGMENT

1.1. Patent Holder must prove Patent Holder must prove Infringer incorporates each Infringer incorporates each & every element of at least 1 & every element of at least 1 independent claim.independent claim.

2.2. Infringer is unable to prove Infringer is unable to prove the patent invalid or the patent invalid or otherwise unenforceable.otherwise unenforceable.

Page 18: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1818

TRADE SECRETSTRADE SECRETS

Information, the disclosure of which Information, the disclosure of which would be disadvantageous for the would be disadvantageous for the company.company.

Protection against those that Protection against those that MISAPPROPRIATE confidential MISAPPROPRIATE confidential information. 2 Basic Requirements:information. 2 Basic Requirements:

1) 1) Documented InformationDocumented Information that has that has commercial value.commercial value.

2) Safeguarded by all reasonable means.2) Safeguarded by all reasonable means.

Page 19: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 1919

Trade Secrets – DO’sTrade Secrets – DO’s

COMPANY POLICYCOMPANY POLICY

NON DISCLOSURE CONTRACTSNON DISCLOSURE CONTRACTS

PHYSICAL SECURITYPHYSICAL SECURITY

ELECTRONIC SECURITYELECTRONIC SECURITY

VET OUTGOING MATERIALSVET OUTGOING MATERIALS

Page 20: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2020

Intellectual Property Rights –Intellectual Property Rights –Valuable but PerishableValuable but Perishable

Recognize and evaluate IP early.Recognize and evaluate IP early.

Review portfolio regularly for focus Review portfolio regularly for focus and cost control.and cost control.

Reassess opportunities to exploit Reassess opportunities to exploit your IP regularly to maximize return your IP regularly to maximize return on investment.on investment.

Page 21: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2121

Intellectual Property is KINGIntellectual Property is KING

There is an inexhaustible supply of new There is an inexhaustible supply of new intellectual property, accessible in some intellectual property, accessible in some degree to everyone that wants it.degree to everyone that wants it.

The law provides a limited opportunity for The law provides a limited opportunity for those that discover or create it to profit those that discover or create it to profit by it. by it.

The skillful exploitation of IP is the The skillful exploitation of IP is the single biggest factor in business single biggest factor in business success today.success today.

Page 22: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2222

IP Management and ControlIP Management and Control Have an IP strategy component to the Have an IP strategy component to the

business plan.business plan. Demonstrate a top-down commitment Demonstrate a top-down commitment

to cultivating and protecting IP.to cultivating and protecting IP. Have a rational internal process for Have a rational internal process for

handling and safeguarding IP.handling and safeguarding IP. Conduct employee training regularly.Conduct employee training regularly. Document, document, document.Document, document, document. Search for and Evaluate competitor’s IP Search for and Evaluate competitor’s IP

with same intensity.with same intensity.

Page 23: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2323

SpeakersSpeakers

Vern MaineVernon Maine, of Vern Maine & Associates, leaders in intellectual property strategies and law. Founder and managing partner of the firm. Registered to practice in New Hampshire, Massachusetts, and New York, and before the U.S. Patent and Trademark Office and the Court of Appeals for the Federal Circuit. Founded the practice in 1993, providing legal counseling, services and seminars on intellectual property and business law, including U.S. provisional, utility, and design patents, PCT patent applications, trademarks, copyrights, trade secrets, licensing, infringement, contracts, and related business matters. For more info, www.vernmaine.com

Bob CarrollBob Carroll has more than 20 years experience in information technology, business consulting, data services and engineering. He has been a key contributor on projects running the gamut from the B-2 Stealth Bomber to improving student performance in New England public and private schools. His work involves selecting and implementing next generation strategies, methodologies, and technologies for clients. Most recently, Bob is focused on Data Loss Prevention, Security and Regulatory Compliance, such as Mass 201 CMR 17.00 for private sector business and public sector, such as schools and local government. See www.bobcarrollconsultant.com

Page 24: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2424

Possible Implications and Why be Possible Implications and Why be Concerned?Concerned?

Intellectual Property Intellectual Property – most business owners have invested their unique knowledge, experience, – most business owners have invested their unique knowledge, experience, and creativity in their business – that should be treated as and creativity in their business – that should be treated as propertyproperty and should be protected from and should be protected from competitorscompetitors

Trade SecretsTrade Secrets OUTED –OUTED – What if your confidential business deal with another company to exploit What if your confidential business deal with another company to exploit your newly developed technology is scuttled before it is announced because a competitor got wind your newly developed technology is scuttled before it is announced because a competitor got wind of it and made the other party a better offer for the same technology? of it and made the other party a better offer for the same technology?

InfringingInfringing – What happens if you get a “Cease and Desist” letter from a lawyer saying you must – What happens if you get a “Cease and Desist” letter from a lawyer saying you must stop using your trademark, or that your production method is infringing their patent, or that your stop using your trademark, or that your production method is infringing their patent, or that your website or marketing collateral are using their copyright protected materials?website or marketing collateral are using their copyright protected materials?

InfringedInfringed – What happens if your competitor launches a new service using a trademark similar to – What happens if your competitor launches a new service using a trademark similar to yours? What if a competitor launches a new website and it has clearly copied images or text from yours? What if a competitor launches a new website and it has clearly copied images or text from your website? What if you just invented a new gizmo and filed a patent application and are your website? What if you just invented a new gizmo and filed a patent application and are investing to get it into production, and your competitor comes out with a product just like it?investing to get it into production, and your competitor comes out with a product just like it?

Employee ObligationsEmployee Obligations – What control do you have over an employee’s intellectual contributions – What control do you have over an employee’s intellectual contributions and confidentiality during and after his or her employment ends?and confidentiality during and after his or her employment ends?

Data [Information] LossData [Information] Loss – important and confidential information may be walking out the door or – important and confidential information may be walking out the door or even unintentionally leaked to others; even competitors – such as client lists or informationeven unintentionally leaked to others; even competitors – such as client lists or information

ComplianceCompliance – HIPAA in health and benefits, FTC ‘Red Flags Rule’, GLBA and BASEL II in finance, – HIPAA in health and benefits, FTC ‘Red Flags Rule’, GLBA and BASEL II in finance, MASS. 201 CMT 17.00, Electronic Medical records – all require protection of data/informationMASS. 201 CMT 17.00, Electronic Medical records – all require protection of data/information

Data Loss during Downsizing Data Loss during Downsizing – As employees exit, does the corporate data? What about loss by – As employees exit, does the corporate data? What about loss by way of temporary or contract help?way of temporary or contract help?

Possible FinesPossible Fines – $5,000 per occurrence, and/or per person effected or compromised; in addition to – $5,000 per occurrence, and/or per person effected or compromised; in addition to a basis for a law suit, bad publicity, and other serious risksa basis for a law suit, bad publicity, and other serious risks

Professional Malpractice RisksProfessional Malpractice Risks – if you are an attorney, CPA, doctor, or any other professional, – if you are an attorney, CPA, doctor, or any other professional, did you know that you are at risk for a malpractice lawsuit if you fail to adequately protect client did you know that you are at risk for a malpractice lawsuit if you fail to adequately protect client information?information?

Page 25: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2525

WorldWideWeb

WorldWideWeb

What is DLP ?What is DLP ?

Data Loss Prevention (DLP) is a Data Loss Prevention (DLP) is a computer security term referring to computer security term referring to systems that identify, monitor, and systems that identify, monitor, and protect dataprotect data

0111011000111

.qbm

.qbb

.qbm

.qbb

Endpoints In Motion

At Rest

Page 26: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2626

Data Loss Prevention DriversData Loss Prevention Drivers

Customer DataCustomer DataSocial Sec. Num.Social Sec. Num.

Credit Card DataCredit Card Data

Health RecordsHealth Records

TheThe

RiskRisk

1:400 Messages contains confidential data

1:50 Network files is wrongly exposed

4:5 Companies lost data on laptops

1:2 Lost Data on USB Devices

Corporate DataCorporate DataFinancialsFinancials

Mergers and acquisitionsMergers and acquisitions

Employee dataEmployee data

Intellectual Prop.Intellectual Prop.Source codeSource code

Design documentsDesign documents

Work productsWork products

ConfidentialConfidential

DataData

TypesTypes

Page 27: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2727

Areas of ConcernAreas of Concern

-3

-2

-1

0

1

2

3

4

Accidents Insider theft Networkpenetration

Theft or loss Espionage

Note: Mean average ratings based on a five-point scale where 1 is “not at all concerned” and 5 is “extremely concerned”Note: Mean average ratings based on a five-point scale where 1 is “not at all concerned” and 5 is “extremely concerned” Data: Data: InformationweekInformationweek Analytics Data Loss Prevention Survey of 218 business technology Analytics Data Loss Prevention Survey of 218 business technology

professionalsprofessionals

How Concerned are you about the following sources of data leaksHow Concerned are you about the following sources of data leaks

Out of a maximum rating of ‘5’Out of a maximum rating of ‘5’

Page 28: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2828

The Concern is Well FoundedThe Concern is Well Founded

Page 29: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 2929

……AndAnd

Of course there is the elephant in the room that Of course there is the elephant in the room that people don’t want to talk about:people don’t want to talk about:

Data Loss Risks During DownsizingData Loss Risks During Downsizing

As employees exit, so does the As employees exit, so does the corporate datacorporate data

Page 30: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3030

What type of confidential, sensitive or proprietary What type of confidential, sensitive or proprietary information did you keep after leaving your information did you keep after leaving your former company?former company?

For the Non-BelieversFor the Non-Believers

Page 31: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3131

How Was Data Removed?How Was Data Removed?

Page 32: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3232

Other Reasons for DLP ?Other Reasons for DLP ?

Most SMB’s fall are regulated by law(s) that Most SMB’s fall are regulated by law(s) that mandate controls over information;mandate controls over information;– Sarbanes-Oxley (SOX) Act Sarbanes-Oxley (SOX) Act – HIPAA in health and benefitsHIPAA in health and benefits– American Recovery and Reinvestment Act American Recovery and Reinvestment Act

(ARRA)(ARRA)– FTC ‘Red Flags Rule’FTC ‘Red Flags Rule’– Gramm-Leach-Bliley Act and Basel II in financeGramm-Leach-Bliley Act and Basel II in finance– MASS. 201 CMR 17.00MASS. 201 CMR 17.00– Payment Card Industry (PCI) Data Security Payment Card Industry (PCI) Data Security

Standard (DSS)Standard (DSS)

Page 33: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3333

So, What Should I Do?So, What Should I Do? DLP is more than just technologyDLP is more than just technology A comprehensive initiative or ProgramA comprehensive initiative or Program

– StrategyStrategy– PeoplePeople– ProcessProcess– TechnologyTechnology

Outline ‘DLP Recipes’ (Recommendations)Outline ‘DLP Recipes’ (Recommendations)

Recipes for DLPCheck Bostonbusinessalliance.com for ‘How To’s’ links, resources, and articles

Recipes for DLPCheck Bostonbusinessalliance.com for ‘How To’s’ links, resources, and articles

Recommendations

Page 34: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3434

StrategyStrategy Stakeholders and business owners need to be Stakeholders and business owners need to be

aware of this and understand the concepts and aware of this and understand the concepts and consequencesconsequences

Governance – What applies to your business?Governance – What applies to your business?– 201 CMR 17.00 ?201 CMR 17.00 ?– FTC Red Flag ?FTC Red Flag ?– HIPAA ?HIPAA ?

Put policies and agreements in placePut policies and agreements in place

Start with an assessment. Where is the risk, what is the risk and how much could it cost my business ? Adopt an acceptable Use policy – (no it is not ok to view pornography on company resources.)Consider Free and Open Source (Truecrypt, Pretty Good Privacy, PGP)Execute non-Compete, NDA, Confidentiality

Start with an assessment. Where is the risk, what is the risk and how much could it cost my business ? Adopt an acceptable Use policy – (no it is not ok to view pornography on company resources.)Consider Free and Open Source (Truecrypt, Pretty Good Privacy, PGP)Execute non-Compete, NDA, Confidentiality

Recommendations

Page 35: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3535

PeoplePeople

Most likely the biggest risk to SMBMost likely the biggest risk to SMB– If you use Temporary LaborIf you use Temporary Labor

BookkeepersBookkeepers ParalegalsParalegals ClerksClerks Contract attorneysContract attorneys

– If you use contractors (1099)If you use contractors (1099)

Assign roles and responsibilities e.g. “Data Stewards” Conduct initial and ongoing training and record acceptance Allow access on “Need to know” basis only PRIOR to the employee leaving, companies should monitor the employee’s access to the network or system to make sure sensitive and confidential data is not being downloaded or send to the employee’s personal email account.

Assign roles and responsibilities e.g. “Data Stewards” Conduct initial and ongoing training and record acceptance Allow access on “Need to know” basis only PRIOR to the employee leaving, companies should monitor the employee’s access to the network or system to make sure sensitive and confidential data is not being downloaded or send to the employee’s personal email account.

Recommendations

Page 36: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3636

ProcessProcess Identify your Intellectual Property and confidential Identify your Intellectual Property and confidential

datadata Are Standard Operating Procedures (SOP) or Written Are Standard Operating Procedures (SOP) or Written

Information Security Program (WISP) required by Information Security Program (WISP) required by law?law?

Understand your processesUnderstand your processes Are there safeguards and audits built into the Are there safeguards and audits built into the

process – catching what is missingprocess – catching what is missing

Ensure that policies and procedures clearly state former employees will no longer have access to sensitive and confidential information they used in their jobs. Enforce this!Where possible and practical, use standard automated workflow processes and forms. These are easier to monitor and safeguard Re-think the process of how you send data and email

-Encryption-sftp, https://

Ensure that policies and procedures clearly state former employees will no longer have access to sensitive and confidential information they used in their jobs. Enforce this!Where possible and practical, use standard automated workflow processes and forms. These are easier to monitor and safeguard Re-think the process of how you send data and email

-Encryption-sftp, https://

Recommendations

Page 37: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3737

TechnologyTechnology

Ensure that basics are in place:-Patches are applied, AV and malware protection, Firewalls

Prevent access to and downloads from sensitive dataEncryption –data, computers, and email (passwords on files ≠ encryption)Shift the responsibility to hosted or third parties – the cloud

Keep your kids off ‘work’ computers and NO P2P

Ensure that basics are in place:-Patches are applied, AV and malware protection, Firewalls

Prevent access to and downloads from sensitive dataEncryption –data, computers, and email (passwords on files ≠ encryption)Shift the responsibility to hosted or third parties – the cloud

Keep your kids off ‘work’ computers and NO P2P

Recommendations

Start small with the high value dataStart small with the high value data The notion of The notion of ‘Reasonable‘Reasonable,’ ,’ ‘Usual and Customary‘Usual and Customary’’ Break up the problem:Break up the problem:

– Data in use (e.g., endpoint actions), Data in use (e.g., endpoint actions), – Lost or stolen laptopsLost or stolen laptops

– Data in motion (e.g., network actions),Data in motion (e.g., network actions),– EmailEmail– Instant messagingInstant messaging

– Data at rest (e.g., data storage) Data at rest (e.g., data storage) – Who has accessWho has access– Secure storageSecure storage

Page 38: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3838

Questions and AnswersQuestions and Answers

Page 39: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 3939

Call to ActionCall to Action Intellectual PropertyIntellectual Property

– Have an IP strategy component to the business planHave an IP strategy component to the business plan– Demonstrate a top-down commitment to cultivating and Demonstrate a top-down commitment to cultivating and

protecting IPprotecting IP– Have a rational internal process for handling and safeguarding Have a rational internal process for handling and safeguarding

IPIP– Conduct employee training regularlyConduct employee training regularly– Document, document, documentDocument, document, document– Search for and Evaluate competitor’s IP with same intensitySearch for and Evaluate competitor’s IP with same intensity

Data Loss PreventionData Loss Prevention– Understand and mitigate the risksUnderstand and mitigate the risks– Know where information resides, especially electronicKnow where information resides, especially electronic– Get educatedGet educated

You have taken the first stepYou have taken the first step– Visit Bostonbusinessalliance.com for new details and Visit Bostonbusinessalliance.com for new details and

informationinformation

Page 40: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4040

Closing and AdjournClosing and Adjourn

Reminder about Boston Business AllianceReminder about Boston Business Alliance– Visit website for suggesting Hot Topics for Visit website for suggesting Hot Topics for

these type of meetingsthese type of meetings– Invite other small business owners and peers Invite other small business owners and peers

who might benefitwho might benefit– Register for future meetingsRegister for future meetings– Ask us to put your name on our email list to be Ask us to put your name on our email list to be

notified of future meetings and eventsnotified of future meetings and events Evaluation formEvaluation form

– Please complete and leave on the table going Please complete and leave on the table going out so that we can continuously improveout so that we can continuously improve

Page 41: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4141

SponsorsSponsors

Website Sponsor:

TechevolutionContact: Corey TapperPhone: 781-595-2040www.techevolution.com

Facilities/Location Sponsor:

Sunbelt Business Sales & AcquisitionsContact: Mariola AndoniPhone: 781-932-7355www.sunbeltne.com

Refreshment Sponsor:

Analytix SolutionsContact: Jason LefterPhone: 781-503-9000www.analytixsolutions.com

Page 42: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4242

Contact InformationContact Information Boston Business AllianceBoston Business Alliance

– www.BostonBusinessAlliance.comwww.BostonBusinessAlliance.com– See website for additional Contact and Member informationSee website for additional Contact and Member information

Attorney Vern MaineAttorney Vern Maine– Phone: (603) 886-6100 x7007Phone: (603) 886-6100 x7007– Email: [email protected] Email: [email protected] – Website: Website: www.vernmaine.com

Bob CarrollBob Carroll– Phone: (617) 314-9813Phone: (617) 314-9813– Email: [email protected] Email: [email protected] – Website: Website: www.bobcarrollconsultant.com

See our website and handouts for other contacts, along with information on Intellectual Property, Data Loss Prevention, the Boston Business Alliance, our members and our sponsors.– www.BostonBusinessAlliance.comwww.BostonBusinessAlliance.com

Feel free to pick up any of the handouts on the table.

Page 43: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4343

Appendix SlidesAppendix Slides

Page 44: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4444

Applicable Statutes and RegulationsApplicable Statutes and Regulations

Sarbanes-OxleySarbanes-Oxley (SOX) Visibility and disclosure (SOX) Visibility and disclosure regulations for public companiesregulations for public companies

Gramm-Leach-Bliley ActGramm-Leach-Bliley Act of 1999 (sometimes called of 1999 (sometimes called the financial modernization actthe financial modernization act

HIPAAHIPAA – Health Insurance Portability and Accountability – Health Insurance Portability and Accountability Act of 1996 places requirements on the health care Act of 1996 places requirements on the health care industryindustry

FTC ‘Red Flags Rule’FTC ‘Red Flags Rule’ – for law firms, professional – for law firms, professional services, and financial institutionsservices, and financial institutions

MASS. 201 CMR 17.00MASS. 201 CMR 17.00 for Personal Identity Information for Personal Identity Information PCI-DSSPCI-DSS Payment Card Industry Data Security Payment Card Industry Data Security

Standards – For processing credit cardsStandards – For processing credit cards FERPAFERPA- Family Educational Rights and Privacy Act – If - Family Educational Rights and Privacy Act – If

you deal with public schoolsyou deal with public schools BASELBASEL – Bank of International Settlements – Banking – Bank of International Settlements – Banking

lawslaws

Page 45: Protecting Intellectual Property & Data Loss Prevention

9/23/099/23/09 Boston Business AllianceBoston Business Alliance 4545

Technology TermsTechnology Terms

Data Loss Prevention (DLP) - Data Loss Prevention (DLP) - Data Loss Prevention (DLP) is Data Loss Prevention (DLP) is a computer security term referring to systems that identify, a computer security term referring to systems that identify, monitor, and protect data: at the endpoints - in use (USB monitor, and protect data: at the endpoints - in use (USB devices, laptops, PDA, iPhone), in motion (e.g., moving through devices, laptops, PDA, iPhone), in motion (e.g., moving through the network – browsers and email), and data at rest (file the network – browsers and email), and data at rest (file systems, databases, and other storagesystems, databases, and other storage

EncryptionEncryption – Transforming information using and algorithm – Transforming information using and algorithm Firewall – Firewall – A device or software designed to block unauthorized A device or software designed to block unauthorized

access while permitting authorized comm.access while permitting authorized comm. Free and Open Source SoftwareFree and Open Source Software – An alternative to – An alternative to

Microsoft Windows. Linux and Apache are the most famousMicrosoft Windows. Linux and Apache are the most famous https://https:// – Hypertext Transfer Protocol - – Hypertext Transfer Protocol - SSecureecure Malware – Malware – Malicious Software - Software that infiltrates an Malicious Software - Software that infiltrates an

owners computer without the owner’s informed consentowners computer without the owner’s informed consent SFTPSFTP Secure File Transfer Protocol – A means of securely Secure File Transfer Protocol – A means of securely

transmitting datatransmitting data FERPAFERPA- Family Educational Rights and Privacy Act – If you deal - Family Educational Rights and Privacy Act – If you deal

with public schoolswith public schools