Refine your interests »
The scenario is familiar, and frustrating, to employers: an employee, preparing to leave to join a competitor, accesses sensitive product, customer, and sales data using his or her own credentials, copies it to a flash drive,...more