Attorney Steven J. Frank, who will be publishing a book about intellectual property for tech managers, penned an interesting piece for IEEE titled “Source Out, Risk In.” He cites the case of the California company that opened a new India operation, then discovered an employee had sent key files to her Yahoo email account. The company said it couldn’t get the local cybercrime unit in India interested in pursuing the crime; and the police say the company didn’t cooperate with its investigation.
Whatever the situation, Mr. Frank offers this advice in his article:
- Work with an established partner, since they understand how to implement security.
- Perform your due diligence. Scrutinize physical security and personnel practices, policies and procedures.
- Lay it out in the contract.
Read the article for details.