No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Governance

Protecting Proprietary Information

by Marcy J. Maslov
April 24, 2014
in Governance
Protecting Proprietary Information

You’re designing a new, cutting-edge technology for the company. You’ve tried everything, but one element of the design is just not working right. None of your teammates can help, so you post the problem on your social media sites and ask your online friends to help solve the problem.

What are the ethical dilemmas and consequences of this action?

-e-Factor!® scenario

This scenario is built from a real-life experience working for a high-tech company, but it can apply to any organization or situation you might be facing.  Apart from tangible physical assets, if we own intellectual property or proprietary information, this issue is relevant.   The problem is to define exactly what is proprietary and who owns the rights to the property or information.  And the ethical dilemma deals with confidentiality, trust, integrity and accountability. When we post private information to the Internet, we have no idea about where our information goes and how it might be used (or misused).  I use the terms “confidential,” “private” and “proprietary” interchangeably in this discussion.

In the accounting world, “confidential information” basically means anything not publicly known. This can be a customer database, product cost, salary information, etc.  If we’re not sure whether something is confidential, we can ask “would this harm us if it was made public?” If the answer is yes, there’s your “sign.”  What many people don’t know or don’t think about is that private information posted to social media becomes public knowledge.  This is a huge challenge for organizations, and frequently news headlines include leaks of sensitive information that create a huge mess.

But who owns the information?  This is the bigger question, and leads to the question of whether or not we have the right to post it.  If we create a report, is it ours or is it the property of the company we work for? If we design a new product, is it ours or the company’s? In this dilemma, the product designer might feel the information is his or hers since he or she created it, even with a clearly stated company policy on ownership rights. The fact is that most people don’t think about posting to social media as a “reveal” of something confidential or proprietary.  Most people do think that if they created something it’s “theirs.”  Unless the company has a clear policy on ownership of intellectual property and a clear policy on protecting confidential information, we have different people with different interpretations and expectations. And, like it or not, our interpretations are influenced by the position we hold in the organization and the work that we do, as well as our background and culture.

So who are the stakeholders here?  Who is affected by this dilemma and its outcome? The product designer, the supervisor, the company and even the online “friends” could all be stakeholders.  The designer, supervisor and company are obvious. They are creating something to sell and drive profits.  But the online friends?  Well, who are these folks?  Could they be competitors?  Could they be working on their own products and this question sparks the missing link to their own work?  Or could they truly be just friends helping friends?   Hmmm.  Food for thought, huh?

In reality, we don’t know who else is viewing our online question besides our friends. But “someone” is tracking our keystrokes, either internally or externally.  Internally, many workers seem to feel information on their company computers is their private information and nobody has the right to see it. Not true. Most companies do monitor online activity and the computers are owned by the organization.  External monitoring is another story. I recently learned about data brokers and “big data.” If we type a keyword that someone is searching online, our information could be tracked and sold. This disturbed me so much I wrote a blog about it and what protections exist. In this light, we have to include “online friends” as stakeholders, especially if they’re selling our data.

What are our options in this situation?  The cat is out of the bag now, and what is posted online stays online.  Remember, the internet is a great source of information and for younger generations it’s the “only way” to get information (sorry, librarians!).  So it is likely the product designer thought the question was a harmless way to figure out the design challenge. Potentially serious consequences for posting online were probably not evaluated, even if the policy handbook and confidentiality agreements were signed!  There’s no way to hide the action of posting, but could we trust this person in the future?

There is one more perspective to explore: we don’t know the nature of the information revealed, only that some element is not working.  Is it critical to full functionality?  Or is it some minor mechanical malfunction?  Does this perspective change our viewpoint or actions?  Possibly.  It depends on whether confidentiality was defined previous to the posting and whether or not the designer understood the policies related to this action, as well as the steps the organization took to train its people.

There are two people who need to evaluate the options and make decisions on what to do next – the designer and the supervisor. If you were either of these two, what options do you have and what would you do?


Previous Post

The Rewards and Risks of Employee Pay Cards

Next Post

The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

Marcy J. Maslov

Marcy J. Maslov

After watching companies and clients struggle with ethical dilemmas, Marcy J. Maslov invented e-Factor!®, a business ethics board game designed to provide a practice arena for solving real-life ethical dilemmas before they cost time, money or reputation. Marcy is founder and CEO of Empowerment Unlimited Coaching, LLC, a business coaching practice devoted to building strong, ethical leaders and entrepreneurs. She has extensive Fortune 500 and entrepreneurial background including implementation of Sarbanes-Oxley programs, creation of corporate ethics courses, forensic accounting and public speaking on business ethics. Marcy has lived or worked in over 20 countries, including France, Mexico and Canada. She is a Certified Professional Coactive Coach, has earned a BS in Accountancy (U of IL Champaign-Urbana) and MBA (Duke University ‘92). Contact Marcy at marcy@e-Factorgame.com or www.e-Factorgame.com.

Related Posts

ice building

How Business Leaders Can Navigate a Shifting Immigration Policy Landscape

by Jorge Lopez, Deepti Orekondy and George Michael Thompson
June 25, 2025

Immigration policy changes under the Trump Administration extend far beyond border security, creating immediate business disruptions from workforce gaps to...

risk reporting concepts

The ‘So What?’ Problem With Board Risk Reporting

by Jim DeLoach
June 24, 2025

10 modern principles for transforming risk communication from compliance exercise to strategic dialogue in uncertain times

board of directors meeting table

Before You Say Yes to That Board Seat: A Director’s Due Diligence Checklist

by Chase Cole and Sidney Edgar
June 24, 2025

Public company directors face scrutiny from Wall Street, Congress, the SEC and beyond — comprehensive preparation is essential for business...

slippery slope ice mountain

The Slippery Slope & Your Culture of Integrity

by Mary Shirley
June 23, 2025

Small transgressions and unanswered questions create pathways to major misconduct — and compliance teams need strategies beyond punishment

Next Post
The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights