The Fortune Global 500 and the smallest research and development organizations in the U.S. have another ruleset to keep their eye on this week. It is named DTSA or S.1890 - Defend Trade Secrets Act of 2016 has passed the Senate. Operational Risk Management (ORM) is preparing for the next addition to national laws.
The attribution of cyberespionage adversaries has been gearing up since the Sony Pictures hack. The private sector has been hunting and identifying those shadow individuals and nation state special units for years. Now the lawyers can get more aggressive with civil actions.
The question remains, will another law deter the actions by global organized crime and the intelligence community of some significant nations? How will attribution and more aggressive civil actions in foreign jurisdictions make a difference?
As a global organization, can you access your database of confidential trade secrets? No different than the task of the identification of information assets that you are going to protect, you need an inventory. What are they and where are they? Everyone knows the formula for "Coca-cola" is written on a single piece of paper that is locked up in a vault in Atlanta, GA right? Or is it?
There are trade secrets across America that have been stolen by operatives working inside organizations. They may be preparing to leave the U.S. for another country outside the reach of law enforcement and the legal process for seizing the stolen property. That is going to change soon.
The attribution of cyberespionage adversaries has been gearing up since the Sony Pictures hack. The private sector has been hunting and identifying those shadow individuals and nation state special units for years. Now the lawyers can get more aggressive with civil actions.
The question remains, will another law deter the actions by global organized crime and the intelligence community of some significant nations? How will attribution and more aggressive civil actions in foreign jurisdictions make a difference?
As a global organization, can you access your database of confidential trade secrets? No different than the task of the identification of information assets that you are going to protect, you need an inventory. What are they and where are they? Everyone knows the formula for "Coca-cola" is written on a single piece of paper that is locked up in a vault in Atlanta, GA right? Or is it?
There are trade secrets across America that have been stolen by operatives working inside organizations. They may be preparing to leave the U.S. for another country outside the reach of law enforcement and the legal process for seizing the stolen property. That is going to change soon.
The EX-Parte Seizure Order is part of the Trade Secrets bill that allows a trade secret owner to obtain an order from a judge for U.S. marshals to seize back the trade secret from the alleged bad actor without prior warning. This is to protect the trade secret owner from having the alleged bad actor skip the country or destroy the evidence before it is recaptured.Now that Trade Secrets are in the same legal and enforcement category with patents and trademarks, you can predict that your legal budgets will need to be adjusted, upwards. In general, what is a Trade Secret?
The subject matter of trade secrets is usually defined in broad terms and includes sales methods, distribution methods, consumer profiles, advertising strategies, lists of suppliers and clients, and manufacturing processes. While a final determination of what information constitutes a trade secret will depend on the circumstances of each individual case, clearly unfair practices in respect of secret information include industrial or commercial espionage, breach of contract and breach of confidence.The effort to make intellectual property a "Trade Secret" is another strategy in itself. The determinations to designate something a trade secret is going to depend on the invention or the data itself. We understand. So what?
A Chinese businessman pleaded guilty Wednesday (March 23) in federal court in Los Angeles to helping two Chinese military hackers carry out a damaging series of thefts of sensitive military secrets from U.S. contractors.Our adversaries are determined. They are already here. It has been documented for years. Let the next wave of legal indictments and seizures begin. One thing is certain. The "Insider Threat" is still present and your organization can do better. The ability to effectively utilize the correct combination of controls, monitoring, technology and internal corporate culture shifts will make all the difference. What are you waiting for?
The plea by Su Bin, a Chinese citizen who ran a company in Canada, marks the first time the U.S. government has won a guilty plea from someone involved with a Chinese government campaign of economic cyberespionage.
The resolution of the case comes as the Justice Department seeks the extradition from Germany of a Syrian hacker — a member of the group calling itself the Syrian Electronic Army — on charges of conspiracy to hack U.S. government agencies and U.S. media outlets.
No comments:
Post a Comment