MSG Team's other articles

9747 How Using the HR Scorecard Creates Long Term Value for Organizations

Shorter Term Targets and the HR Function Typically, the Human Resources (HR) function is supposed to operate on short-term targets such as the number of people hired for different positions and within the targets set in the short term. For instance, in most manufacturing companies, it is the norm to ask the HR function to […]

10328 Measuring Return on Investment of Employer Branding

“95% of job seekers’ very first experience with you comes through the ‘careers’ section of your website”, reveals Bernard Hodes Group Inc., a full service employer brand agency, which was acquired by Findly in June 2013. This means your careers’ website or section decides who responds to the job openings with your organization. It makes […]

12016 Why Software Employees Face Significant Occupational Hazards and Addressing Them

Why Occupational Hazards are Not Limited to Manufacturing Firm Employees Alone Historically, manufacturing firms and those firms engaged in construction and jobs involving operation of heavy machinery and the like were thought to have significant Occupational Hazards or the dangers to employees on the job. Occupational Hazards, as the name implies, are the risks to […]

11304 Skills are a Key Ingredient of Success in Contemporary Organizations

Types of Skills In a world where unprecedented change and relentless competition between individuals, companies, nations, and other players is the norm, to succeed, one must have the right skills. The skills that are acquired as part of the formal education are one aspect and those acquired on the job as well as from informal […]

11980 Why Human Resource Management Must Change for the Coming Robotics Revolution

The Coming Automation and Robotics Revolution Many experts have predicted that the robotics revolution and automation trends are coming sooner than you think and why it is time for organizations to prepare for the invasion of the robots and artificial intelligence. In a scenario where nearly 60% of the jobs would be lost to automation […]

Search with tags

  • No tags available.

When Knowledge is Power, It Makes Sense to Protect it from Theft

In times when the knowledge based economy thrives and is predominant, it is more than important for organizations to protect their most valuable asset, which is data and information. Indeed, given the fact that contemporary organizations use knowledge as the main leverage over competitors, it becomes necessary and even critical to enforce strict data security and confidential information protection policies.

Note the emphasis on data and information and especially the confidential information since if competitors and rivals get hold of such information, they can easily have an unfair advantage over the firms.

Indeed, the ongoing Trade Wars between the United States and China are as much about protecting the Intellectual Property of US firms from preying and theft by China as they are about tariffs and other aspects.

Talking about China, most experts in the field of IP or Intellectual Property concur in the view that in its quest for technological superiority and dominance, it is increasingly resorting to blatant theft of IP and Confidential Information from the US based firms.

In this context, while at the nation level, governments are seized of this issue, it is incumbent upon organizations and especially the HR Managers to “police” the browsing and other online habits of their employees.

How Data Theft Happens in Organizations and How to prevent it

To explain, most theft of data happens mainly by internal actors who can be in the pay of rivals seeking access to a firm’s IP secrets. Indeed, while hacking and phishing are also common, most of the reputed and large organizations have elaborate firewalls and other safeguards that shield their most valuable data from external hackers.

Of course, we do not mean to say that external sources of theft are not important, just that it is visible and can be detected whereas theft by internal employees often happens “below the radar” and hence, it is difficult to detect.

This is the reason why many organizations instruct their IT (Information Technology) and Systems staff to monitor the internet and online behavior of their employees so as to spot and preempt any possible “leakage” of data from them. In addition, they also do not allow personal devices with internet browsing capabilities including Smartphones without due authorization and due diligence.

Indeed, in recent years with the proliferation of Smartphones, HR Managers have a new headache in the form of regulating the Smartphone usage by their employees and while most organizations do not want to be seen as interfering with such habits, they are also seized of the fact that IP theft can happen if they do not do so.

Thus, this is a key challenge for HR Managers and the IT and Systems Staff as they have to keep tab on this aspect as well.

NDAs and Protecting Confidential Information

Having said that, it is not only data theft that is the challenge for organizations and another critical area of concern is the breaching of confidential information by employees. Indeed, this is the reason why Multinational organizations have elaborate NDAs or Non Disclosure Agreements wherein they clearly specify the terms and conditions of the employment contract that bar and prohibit them from sharing such information with others, including family members.

This is more the case as one goes up the organizational hierarchy as then, one is more exposed to trade secrets and sensitive information that make or mar the chances of firms.

Indeed, given the fact that most middle and higher management personnel routinely deal with confidential information if leaked can lead to advantage in terms of Stock and Equity prices, HR Managers usually prepare a list of select individuals who are privy to such information and they restrict such information to this circle only.

Age Old Problems of Human Nature and Easier Means in the Present Times

Taken together, what these aspects mean is that the Information Age has spawned a set of challenges for the HR Managers that hitherto were less demanding.

Indeed, in earlier decades, it was easy to monitor the phone calls and the written communications since they were done by Typewriters and other machine devices which were much more visible than the present day means of leaking information which, as mentioned earlier, can happen quite stealthily.

Moreover, in earlier times, Senior Executives usually used to meet with their peers in Hotels and other discreet places where privacy and security were afforded. Whereas now, any employee can hack into the internal systems as well as reveal the passwords and the IP Addresses of key personnel.

In addition, it is easier now for any employee to simply login to the Intranet and download the proprietary information and coolly take it with him or her on a Pen Drive or a Smartphone.

Even more, it is also easy in the present times with Fax and Printers having transmitting capabilities and this is the reason why many experts believe that while these issues are age old problems of human behavior, the scope for mischief has increased thanks to the ease with which it can be done.

Concluding Thoughts

Lastly, these challenges happen at every level and in all entities, whether they are Corporates or Governmental Agencies. Thus, a whole profession of Cyber Security personnel has now emerged that advises Senior Management figures and HR Professionals on how to protect data and confidential information.

Added to this are the steadily tightening policies and Zero Tolerance attitudes of HR Managers to these challenges. Thus, to conclude, HR professionals cannot afford not to enforce strict data security and confidential information protection policies.

Article Written by

MSG Team

An insightful writer passionate about sharing expertise, trends, and tips, dedicated to inspiring and informing readers through engaging and thoughtful content.

Leave a reply

Your email address will not be published. Required fields are marked *

Related Articles

The Challenges of Managing Attrition in Contemporary Organizations

MSG Team