Law

Legal Briefs: Tinker, Tailor, Whos the Spy?

By JULIE M. ENGBLOOM May 13, 2015

EngbloomJ_0

This post is sponsored.

This article originally appeared in the June 2015 issue of Seattle magazine.

The headlines are full of data breach attacks millions of credit card numbers stolen, health care information hacked all of it feeding the thriving cyber-crime economy. More often than not, the bad actors lurk outside the borders of the United States and are rarely held accountable. These externally based attacks come in various forms, including social engineering plots using increasingly sophisticated forms of subterfuge that can fool the most experienced of employees. These types of breaches garner the bulk of the media and publics attention.

Under the radar, at least from the publics perspective, are those breaches that originate from inside the company. The target is proprietary information. The insider hack is more difficult to detect and mitigate and is often more economically crippling to the company than traditional forms of hacking.

A companys intellectual and proprietary information is often its most valuable asset. While insider threats are not as common as external breaches, they often are more expensive to the company. External attacks typically, though not always, target customer information, while insider threats target a companys intellectual property. Most troubling, insiders are trusted personnel who often have full access to the companys most critical assets: intellectual property, trade secrets and other forms of highly sensitive information.

An internal threat can originate from all levels within an organization, from CEOs to interns to third-party vendors. Companies must, of course, take measures to protect the perimeter of their physical and virtual footprint from outside intruders. In addition, companies must take steps to protect the perimeter from the inside out. When addressing the insider risk, pairing technological protocols, along with comprehensive employee policies, can mitigate the threat. And while all of these tools require an investment of time and money up front, the cost savings in the long run can be significant.

1. Information Technology Protocols. The first level of defense is to create roadblocks for deliberate (or inadvertent) attempts to move sensitive and/or valuable information off site without permission. Businesses need to identify their most prized possessions (pricing strategies, technical/engineering specs, financial data, acquisition tactics, etc.) and then take steps to shelter them. For example, managing user access rights will limit the number of employees with easy access to certain types of information based on these individuals roles within the company. This type of role-based, hierarchical access approach can be coupled with logging mechanisms and other IT protocols that will both deter misuse and detect it if it occurs. In addition, review your companys firewall protocols. Often, a companys firewall works to prevent malicious attacks from coming in. Verify that your companys firewall restricts and tracks outgoing data, too.

2. Personnel Protocols. It is difficult to identify employees or vendors who pose a risk. A trusted employee may experience financial problems that could make the person vulnerable to undue influence in the form of a bribe. A disgruntled employee passed over for a promotion may decide to exact revenge. Identifying an insider threat is not easy. Companies must establish confidentiality policies and engage in frequent communication regarding those policies to increase awareness around safeguarding confidential information. Doing so demonstrates the importance the company places on its proprietary assets and also demonstrates its seriousness with respect to addressing a breach, should it occur. Managers and staff must be trained about access, nondisclosure and confidentiality. Finally, review the companys employee handbook section on confidentiality and think about adopting an Acceptable Use of Technology Policy. Companies must employ both technological and policy-related tools to ensure that data protection and system integrity are protected against both external and internal threats. Both before and after a breach occurs, counsel (in-house or external) can play a vital role in preparing a breach plan, developing suitable employee policies and procedures, working with law enforcement if appropriate, and navigating the post-breach landscape of notification and litigation.

JULIE M. ENGBLOOM is a shareholder at Lane Powell where she co-chairs the Privacy and Data Security and Business Crisis Management and Emergency Remedies Practice Groups. Reach her at 800.426.5801 or [email protected].

Follow Us