Are your employees compromising information security efforts?

Levenfeld Pearlstein, LLC

Locked KeysCompanies devote significant resources to keeping computer networks and information secure, but those efforts can be undone when employees work outside the secure workspace. When an employee downloads a document to a personal laptop, saves information on an unencrypted external storage drive, uses the local coffee shop wi-fi, or – as the headlines have reminded us this week – uses personal email for business purposes, secure information is at risk.

What’s an employer to do? Here are some tips:

  1. Make sure that your human resources and technology teams are working together on issues relating to network and information security.
  2. Implement a clear policy prohibiting use of personal email for business purposes and prohibiting employees from using unsecured internet connections and storage drives.
  3. Only allow employees to access company networks with approved devices and, if you allow employees to use personal mobile devices for business, implement a “BYOD” (Bring Your Own Device) Policy that sets security requirements (such as requiring strong passwords) and gives the company the right to review and wipe devices.
  4. Train all employees in security protocols so that they understand not only your requirements but the reasons why they’re necessary.  Employees may not think much of using public wi-fi or personal email until you explain the real risk that both raise.
  5. Make sure that employees who work remotely have secure options for connecting.
  6. Monitor outgoing email to identify employees who may be emailing confidential information to personal emails.
  7. If you discover that an employee is violating security requirements — take appropriate action.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Levenfeld Pearlstein, LLC | Attorney Advertising

Written by:

Levenfeld Pearlstein, LLC

Levenfeld Pearlstein, LLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.