Here at the Law Office of Vincent Miletti, Esq. and the home of the #UnusuallyMotivated movement, we take pride as a resilient and dependable legal services firm, providing such services in both a traditional and online, web-based environment. With mastered specialization in areas such as Employment and Labor Law, Intellectual Property (IP) (trademark, copyright, patent), Entertainment Law, and e-Commerce (Supply Chain, Distribution, Fulfillment, Standard Legal & Regulatory), we provide a range of legal services including, but not limited to traditional legal representation (litigation, mediation, arbitration, opinion letters, and advisory), non-litigated business legal representation and legal counsel, and unique, online legal services such as smart forms, mobile training, legal marketing, and development.
Still, we, here at Miletti Law®, feel obligated to enlighten, educate, and create awareness, free of charge, about how these issues and many others affect our unusually motivated® readers and/or their businesses. Accordingly, to achieve this goal, we have committed ourselves to creating authoritative, trustworthy, & distinctive content. Usually, this content is featured as videos posted on our YouTube Channel https://www.youtube.com/channel/UCtvUryqkkMAJLwrLu2BBt6w and blogs that are published on our website WWW.MILETTILAW.COM. With that, the ball is in your court and you have an effortless obligation to subscribe to the channel and sign up for the Newsletter on the website, which encompasses the best way to ensure that you stay in the loop and feel the positive impact of the knowledge bombs that we drop here!
As the authoritative force in Employment Law, it only seemed right to introduce one of the many upcoming series where we remain persistent in introducing a variety of topics, which will look to not only educate but also deliver in a sense that only Miletti Law® can. In this regard, this blog is Part VII of our series on “Cybersecurity Measures to Protect Employers.” In Part VI, we provided you with key information concerning “Taking Advantage of Technologies Related to Information & Network Protection,” which is the second cybersecurity initiative that an employer may take as part of taking reasonable measures to protect confidential information and trade secrets. As we continue to explore other key cybersecurity initiatives in this short blog and Part VII of the series, we have hammered on “Deterring the Physical Removal of Confidential Information,” which is the third cybersecurity initiative that every employer should take pursuant to the same goal.
Deterring the Physical Removal of Confidential Information
At times, employees can misappropriate confidential information by removing it physically from the workplace. This implies that employers should not only restrict the digital theft or removal of confidential information but they should also curb and prohibit the physical removal of confidential information. This could be done through the adoption of cybersecurity policies restricting employees from removing trade secrets and/or confidential information such as files, documents, and data from the workplace. Such policies should specify that no employee, whether authorized or unauthorized to access and use such information, should physically remove, whether in their copied or original form, any confidential information from the employer’s premises.
Additionally, such policies and measures should dictate and specify who should have access to printers and/or photocopiers at the workplace, as well as contain restricted printing and/or photocopying permissions for any digital or non-digital information that is considered confidential by the employer. Through such measures and policies, employers may prevent unauthorized dissemination and misappropriation of trade secrets and other confidential information that may be physically removed from their premises. Importantly, an employer may succeed in convincing a court that by setting up measures and adopting policies to deter and restrict the physical removal of confidential information from their business premises, they took reasonable steps to protect confidential information and trade secrets.
We hope that we have enlightened you with key information on how you, as an employer, can adopt policies and measures to deter and restrict the physical removal of confidential information to ensure that they are safe and secure from unauthorized access and eventual misappropriation and dissemination.
In Part VIII of this series, we shall move the discussion forward by hammering on “Prohibiting Employee Use of Portable Mobile & Storage Devices,” which is the fourth initiative among several “Vital Cybersecurity Initiatives that Employers Should Take” as part of taking reasonable steps in protecting their trade secrets and confidential information.
As usual, stay tuned for more legal guidance, training, and education. In the interim, if there are any questions or comments, please let us know at the Contact Us page!
Always rising above the bar,
Isaac T.,
Legal Writer & Author.