Duane Morris Home
Search Site | Languages | Site Map | Alumni | Careers | Contact Us | Watch Duane Morris Video Listen to Duane Morris Podcasts, Webcasts and Audio Connect with Duane Morris LLP on LinkedIn Follow Duane Morris LLP on Facebook Follow Duane Morris LLP on Twitter Subscribe to RSS feed
  • About Duane Morris  ∨
    • Annual Report
    • Firm Rankings and Statistics
    • Past and Present
    • Firm Accolades and Honors
    • Attorney Accolades and Honors
    • Diversity and Inclusion
    • Women's Initiative
    • Pro Bono
  • Practices and Industries  ∨
    • Expanded Service Area Listing
  • People
  • Offices
  • Annual Report
  • News, Pubs and Multimedia  ∨
    • Alerts and Updates
    • Bylined Articles
    • In the News
    • Press Releases
    • For the Press
    • Video
    • Podcasts
    • Blogs
  • Events
  • Affiliates

By-Lined Articles
Events
For the Press

Home > Publications > By-Lined Articles

SHARE: Email this page Print This

By-Lined Article

Batten Down the IT Hatches When It Comes to Exiting Employees

By Eric J. Sinrod
October 8, 2008
Findlaw.com

Companies apparently need to be afraid - very afraid - and must be very careful when dealing with exiting employees who have knowledge of corporate information technology.

Indeed, according to a recent survey by Cyber-Ark Software, as many as 88 percent of IT administrators, if laid off tomorrow, would abscond with sensitive company information. Such information includes high-level and privileged passwords, customer databases, R&D plans, financial reports, HR records and merger and acquisition plans.

Privileged password lists are particularly problematical, as they provide the keys to unlock access to information residing on corporate networks. And of the group that said that they would abscond with company information, one-third stated that they would take the privileged password lists.

Because of the danger presented by departing IT personnel who still might be able to access corporate networks, it is important to secure passwords and related identities as much as possible. Furthermore, passwords should be changed regularly.

Perhaps not too surprisingly in this climate, one-third of companies revealed that they believe that industrial espionage and data leakage is commonplace. Such wrongful transfer of data can be accomplished by way of email, mobile devices such as USB sticks, iPods, Blackberrys and laptops.

Biography

Eric Sinrod is a partner in the San Francisco office of Duane Morris. His focus includes information technology and intellectual property disputes. To receive his weekly columns, send an e-mail to with the word "Subscribe" in the subject line.

Disclaimer: This column is prepared and published for informational purposes only and should not be construed as legal advice. The views expressed in this column are those of the author and do not necessarily reflect the views of the author's law firm or its individual partners.

Reprinted with permission of Findlaw.com

 

Duane Morris LLP & Affiliates. © 1998-2013 Duane Morris LLP. Duane Morris is registered service mark of Duane Morris LLP. Disclaimer | Privacy | Attorney Advertising
Other Languages: Chinese • Deutsch • Español • Français • Português