My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
8.0. EDSR 03-08-2004
ElkRiver
>
City Government
>
Boards and Commissions
>
Economic Development Authority
>
EDA Packets
>
2003-2013
>
2004
>
03-08-2004
>
8.0. EDSR 03-08-2004
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
2/4/2016 11:45:40 AM
Creation date
2/4/2016 11:45:39 AM
Metadata
Fields
Template:
City Government
type
EDSR
date
3/8/2004
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
29
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
TechTrends e-Newsletter I February 2004 Page 5 of 5 <br /> trade secrets on three fronts: employees, physical security, and documentation. <br /> 11). <br /> Start with your employees. Insiders pose the most significant threat to information <br /> . security, due more to inadvertent info-sharing than to malicious intent. Vigorous <br /> employee education is vital; use employee handbooks, nondisclosure agreements, <br /> and exit interviews to clarify expectations of confidentiality, especially with respect <br /> to electronic files and Internet usage. Pay particular attention to confidentiality <br /> policies as they affect your telecommuting employees who routinely bring files <br /> home. <br /> Reassess, as well, the physical security of your I.P. Who controls I.D. badge <br /> distribution, access codes, and after-hours security? Where are sensitive files kept? <br /> Are they accessible only to the relevant staff members, or are they in plain view of <br /> visitors? Also, evaluate how well the files themselves are documented: Mark <br /> documents and computer files as confidential. Back up computer information and <br /> restrict access to servers. Remember that these common-sense measures protect <br /> your company twice over: They prevent an initial violation of your I.P. assets, and <br /> they ensure that a violation will be recognized as such by the courts if anything <br /> does end up in the wrong hands. <br /> (For more on trade secrets, see the Winter 2004 issue of Minnesota Technology <br /> magazine). <br /> �` _ ,,.. ,/,;,.� ,,....i:::.A.. 70/L/.,"9�,:i,.. A.1....iaili.:��tk1��"..+,F,.:�}�ytYN/J//9/////////H/„2,_Z.A lS�Y.a:::.::...,.i/ile '///.//.f .&:.....::::i:3flV3f333a3f •., F OlW ,,.".'.... '.4 <br /> a NISI” Network <br /> ME �.f liate <br /> Home I Contact Us I Site Map I Privacy Policy I Terms of Use <br /> © 1994-2004, Minnesota Technology, Inc., All rights reserved <br /> webmaster©mntech.org <br /> PHONE: 612-373-2900 FAX: 612-373-2901 <br /> http://www.minnesotatechnology.org/publications/techtrends/2004/February/printVersion.... 2/23/2004 <br />
The URL can be used to link to this page
Your browser does not support the video tag.