Here at the Law Office of Vincent Miletti, Esq. and the home of the #UnusuallyMotivated movement, we take pride as a resilient and dependable legal services firm, providing such services in both a traditional and online, web-based environment. With mastered specialization in areas such as Employment and Labor Law, Intellectual Property (IP) (trademark, copyright, patent), Entertainment Law, and e-Commerce (Supply Chain, Distribution, Fulfillment, Standard Legal & Regulatory), we provide a range of legal services including, but not limited to traditional legal representation (litigation, mediation, arbitration, opinion letters, and advisory), non-litigated business legal representation and legal counsel, and unique, online legal services such as smart forms, mobile training, legal marketing, and development.

Still, we, here at Miletti Law®, feel obligated to enlighten, educate, and create awareness, free of charge, about how these issues and many others affect our unusually motivated® readers and/or their businesses. Accordingly, to achieve this goal, we have committed ourselves to creating authoritative, trustworthy, & distinctive content. Usually, this content is featured as videos posted on our YouTube Channel https://www.youtube.com/channel/UCtvUryqkkMAJLwrLu2BBt6w and blogs that are published on our website WWW.MILETTILAW.COM. With that, the ball is in your court and you have an effortless obligation to subscribe to the channel and sign up for the Newsletter on the website, which encompasses the best way to ensure that you stay in the loop and feel the positive impact of the knowledge bombs that we drop here!

As the authoritative force in Employment Law, it only seemed right to introduce one of the many upcoming series where we remain persistent in introducing a variety of topics, which will look to not only educate but also deliver in a sense that only Miletti Law® can. In this regard, this blog is Part VI of our series on “Cybersecurity Measures to Protect Employers.” In Part V, we provided you with key information concerning “Consistent & Continuous Improvement and Monitoring of Cybersecurity Policies & Measure,” which is the first cybersecurity initiative that an employer may take as part of taking reasonable measures to protect confidential information and trade secrets. As we continue to hammer on and explore other key cybersecurity issues, this blog, which is Part VI of the series, is an overview of “Taking Advantage of Technologies Related to Information & Network Protection,” which is the second cybersecurity initiative that every employer should take pursuant to the same goal.

Taking Advantage of Technologies Related to Information & Network Protection

In order to prevent and deter unauthorized access and entry into their computer and/or network systems, employers may consider adopting the following cybersecurity measures.

Installing Cybersecurity Protection Software

The detection of suspicious activity and prevention of the introduction of malware includes a range of security functions that can be performed by a wide variety of cybersecurity software. This software can help an employer achieve the following:

  • Prevent and flag unauthorized activities aimed to download unencrypted documents-
  • Limit the types of information and data that can be transferred outside the employer’s computer systems and/or cybersecurity network by employees-
  • Monitor e-mail activity to flag suspicious activity-
  • Trigger notifications that pop-up every time an individual accesses the employer’s computer systems and/or cybersecurity network in response to a possible risk to the security of trade secrets of confidential information-and-
  • Eliminate, detect, and prevent malware from entering the employer’s computer systems and/or cybersecurity network.

When making a cybersecurity claim, an employer may succeed in convincing a court that by installing and using cybersecurity software on their computer systems and/or network, they took reasonable measures to protect confidential information and trade secrets.

Restricting Internet Use & Using Software to Block Website Access

While it could lead to the loss, theft, and/or damage to trade secrets or confidential information stored within computers and networks, malware could find its way into an employer’s computer systems and/or cybersecurity network when untrustworthy websites are accessed by employees. In response to such risks and as part of the cybersecurity initiatives, employers may adopt policies that aim to educate employees about unacceptable Internet uses and use software that blocks access to untrustworthy and malicious websites to prevent the entry and introduction of malware into computer systems and/or cybersecurity network.

Installing Data Encryption Software

Employers may consider installing encryption software that modifies and converts file, passwords, data, and information into an unreadable form that employers may decode and decrypt using their own decryption software. Unless they have access to high-tech decryption software, it is next to impossible for employees or other unauthorized individuals to open, view, and use files, data, or information that has been encrypted, which underscores the importance of encryption software. Similarly, an employer may convince a court that they took reasonable measures to protect confidential information and trade secrets by installing and using data encryption software on their computer systems and/or cybersecurity network.

Using Cybersecurity Firewalls

Outbound and inbound traffic on an employer’s network can be controlled and/or monitored through a type of software known as a firewall. This means that employers could prevent and deter the access and entry of outsiders into their own network systems and, ultimately, ensure that people outside these computer systems and/or cybersecurity networks have no way of accessing the employer’s confidential information or trade secrets. Importantly, firewalls, among a range of other measures discussed in this blog, may constitute reasonable measures and efforts in ensuring the safety and security of an employer’s confidential information.

We hope that we have enlightened you with key information on how you, as an employer, can make use of and take advantage of technology related to information & network protection to ensure that your confidential information and trade secrets are safe and secure from unauthorized access and eventual theft. In Part VII of this series, we shall move the discussion forward by hammering on “Deterring the Physical Removal of Confidential Information,” which is the third initiative among several “Vital Cybersecurity Initiatives that Employers Should Take” as part of taking reasonable steps in protecting their trade secrets and confidential information.

In the meantime, stay tuned for more legal guidance, training, and education. In the interim, if there are any questions or comments, please let us know at the Contact Us page!

Always rising above the bar,

Isaac T.,

Legal Writer & Author.