No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Governance

Protecting Proprietary Information

by Marcy J. Maslov
April 24, 2014
in Governance
Protecting Proprietary Information

You’re designing a new, cutting-edge technology for the company. You’ve tried everything, but one element of the design is just not working right. None of your teammates can help, so you post the problem on your social media sites and ask your online friends to help solve the problem.

What are the ethical dilemmas and consequences of this action?

-e-Factor!® scenario

This scenario is built from a real-life experience working for a high-tech company, but it can apply to any organization or situation you might be facing.  Apart from tangible physical assets, if we own intellectual property or proprietary information, this issue is relevant.   The problem is to define exactly what is proprietary and who owns the rights to the property or information.  And the ethical dilemma deals with confidentiality, trust, integrity and accountability. When we post private information to the Internet, we have no idea about where our information goes and how it might be used (or misused).  I use the terms “confidential,” “private” and “proprietary” interchangeably in this discussion.

In the accounting world, “confidential information” basically means anything not publicly known. This can be a customer database, product cost, salary information, etc.  If we’re not sure whether something is confidential, we can ask “would this harm us if it was made public?” If the answer is yes, there’s your “sign.”  What many people don’t know or don’t think about is that private information posted to social media becomes public knowledge.  This is a huge challenge for organizations, and frequently news headlines include leaks of sensitive information that create a huge mess.

But who owns the information?  This is the bigger question, and leads to the question of whether or not we have the right to post it.  If we create a report, is it ours or is it the property of the company we work for? If we design a new product, is it ours or the company’s? In this dilemma, the product designer might feel the information is his or hers since he or she created it, even with a clearly stated company policy on ownership rights. The fact is that most people don’t think about posting to social media as a “reveal” of something confidential or proprietary.  Most people do think that if they created something it’s “theirs.”  Unless the company has a clear policy on ownership of intellectual property and a clear policy on protecting confidential information, we have different people with different interpretations and expectations. And, like it or not, our interpretations are influenced by the position we hold in the organization and the work that we do, as well as our background and culture.

So who are the stakeholders here?  Who is affected by this dilemma and its outcome? The product designer, the supervisor, the company and even the online “friends” could all be stakeholders.  The designer, supervisor and company are obvious. They are creating something to sell and drive profits.  But the online friends?  Well, who are these folks?  Could they be competitors?  Could they be working on their own products and this question sparks the missing link to their own work?  Or could they truly be just friends helping friends?   Hmmm.  Food for thought, huh?

In reality, we don’t know who else is viewing our online question besides our friends. But “someone” is tracking our keystrokes, either internally or externally.  Internally, many workers seem to feel information on their company computers is their private information and nobody has the right to see it. Not true. Most companies do monitor online activity and the computers are owned by the organization.  External monitoring is another story. I recently learned about data brokers and “big data.” If we type a keyword that someone is searching online, our information could be tracked and sold. This disturbed me so much I wrote a blog about it and what protections exist. In this light, we have to include “online friends” as stakeholders, especially if they’re selling our data.

What are our options in this situation?  The cat is out of the bag now, and what is posted online stays online.  Remember, the internet is a great source of information and for younger generations it’s the “only way” to get information (sorry, librarians!).  So it is likely the product designer thought the question was a harmless way to figure out the design challenge. Potentially serious consequences for posting online were probably not evaluated, even if the policy handbook and confidentiality agreements were signed!  There’s no way to hide the action of posting, but could we trust this person in the future?

There is one more perspective to explore: we don’t know the nature of the information revealed, only that some element is not working.  Is it critical to full functionality?  Or is it some minor mechanical malfunction?  Does this perspective change our viewpoint or actions?  Possibly.  It depends on whether confidentiality was defined previous to the posting and whether or not the designer understood the policies related to this action, as well as the steps the organization took to train its people.

There are two people who need to evaluate the options and make decisions on what to do next – the designer and the supervisor. If you were either of these two, what options do you have and what would you do?


Previous Post

The Rewards and Risks of Employee Pay Cards

Next Post

The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

Marcy J. Maslov

Marcy J. Maslov

After watching companies and clients struggle with ethical dilemmas, Marcy J. Maslov invented e-Factor!®, a business ethics board game designed to provide a practice arena for solving real-life ethical dilemmas before they cost time, money or reputation. Marcy is founder and CEO of Empowerment Unlimited Coaching, LLC, a business coaching practice devoted to building strong, ethical leaders and entrepreneurs. She has extensive Fortune 500 and entrepreneurial background including implementation of Sarbanes-Oxley programs, creation of corporate ethics courses, forensic accounting and public speaking on business ethics. Marcy has lived or worked in over 20 countries, including France, Mexico and Canada. She is a Certified Professional Coactive Coach, has earned a BS in Accountancy (U of IL Champaign-Urbana) and MBA (Duke University ‘92). Contact Marcy at marcy@e-Factorgame.com or www.e-Factorgame.com.

Related Posts

SEC emblem on building exterior

The Rise of a New FINRA Risk & How to Navigate It

by Sarah Hutchins and Corri Hopkins
May 31, 2023

Reg BI says brokers should act in the best interest of their retail customers, but are they? Sarah Hutchins and...

washington dc cherry blossoms

National Conference Lessons Run the Gamut From Messaging Apps to Rebranding Compliance Training

by Mary Shirley
May 31, 2023

CCI columnist Mary Shirley shares some of the lessons she learned during this year’s national compliance conference in Washington, D.C....

parliament

Tracing Key Legal Developments in the UK’s AML Regime

by Prateek Swaika and Sagar Gupta
May 24, 2023

Prateek Swaika and Sagar Gupta of Boies Schiller Flexner discuss the regulatory framework of UK’s anti-money laundering regime and explore...

moby dick illustration

Whaling: When Business Leaders Become Cyber Weapons

by Aileen Allkins
May 24, 2023

The threat of cyber crime is nothing new for the average business. But new tools like AI mean fraudsters have...

Next Post
The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

The Recent Increase in SEC Whistleblower Awards: A Sign of Things to Come? (Part 1)

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment Sanctions SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT