Prevent departing employees from taking customers away, prevent internal employees from leaking data, and prevent employees from leaking data.

Source: Internet
Author: User

Prevent departing employees from taking customers away, prevent internal employees from leaking data, and prevent employees from leaking data.

Preventing leaks of departing employees and internal employees is an important aspect of enterprise management. In particular, with the popularization of Enterprise Information Technology, employees' daily work is carried out through computer networks and important documents (such as the customer list, design drawings, and source code) are formed during work) most of them are directly stored on their own computers, which facilitates work access, but also allows employees to easily copy computer files out and leak them to competitors or for a private purpose, this brings huge risks and losses to enterprises.

According to a recent survey, almost half of professionals from all walks of life admit that they will take away information, including documents, sales agreements, contract lists, and other materials, when switching jobs, and tell them to the next boss. The survey also found that 85% of employees can easily download "competitive" information and take it to the next job. In addition, although most employees can download data from their current company, only 32% of employees will "sell" the data to increase their competitiveness in the next job.

There are several situations for companies to leak data: one is technology theft. For example, a company's software technology is immediately copied by another company and competing; or, some employees have been in a company for some time and start their own business. Another type is the theft of business-type trade secrets. enterprises who have accumulated business secrets for more than a decade or decades have been taken away by new professional managers. In addition, the disclosure of the chief financial officer may bring legal risks to the company, which is also the biggest concern of the boss.


Leaks generally occur at the top, and a potential rule has been formed throughout the industry. For example, Gome and Dazhong are the marketing directors who master the core commercial secrets. Financial Managers and procurement managers of CNPC, Sinopec, and CNOOC for business planning are the most critical. The operation director is the key to mobile and Unicom. Wang Jingsheng, deputy general manager of guozheng Development Company, pointed out that trade secrets are intangible assets of enterprises and reflect the core competitiveness of enterprises. Selling Business secrets is mainly driven by economic interests. Second, it is used as a means to make money, the capital for job-hopping, the weight of asking price, and the Dark Arrow of revenge.

Method 1:Sign strict non-compete agreements and confidentiality agreements, and dilute core secrets.

Most professional managers believe that although it is difficult for enterprises to completely control employee leaks, some preventive measures can still be taken.

Zhang Jianhua, Vice President, pointed out that the world's top 500 confidentiality practices are worth learning from. For example, to strengthen the non-compete agreement and confidentiality agreement, before the entry, go to the CEO, go to the security guard, all need to sign a confidentiality agreement. "In addition, both computer and paper files have a level of authorization. The general manager and general employees see different levels of authorization.

Zhou anjian, Vice President, believes that the environment related to national laws and regulations is more important. If they are as strict as those in the United States, especially listed companies, employee leaks will not be so rampant. If every enterprise, like Pepsi, knows that it is good for Coca-Cola employees to accept the leaks, but in accordance with laws and regulations, resolutely resist the leaks of unfair competition, the market environment is much healthier.

Wang Jingsheng said that secret leaks of key positions and core departments should be prevented. Such as the CEO, R & D Director, Financial Director, and Information Director. He believes that the division of processes and the barriers to departments are a need for confidentiality. "In line with the principle of not putting eggs in a basket, dilute core secrets. For example, a scheme and plan are divided into several parts and links. Different Parts and different links allow different people to know, and each person knows only one part. Like a coin-casting Factory, each stage and department are relatively closed.

Method 2: use technical means to strengthen the protection of trade secrets and prevent leakage of company secrets.

Modern technical means have accelerated enterprises' leaks, and enterprises can also strengthen technical supervision and "anti-reconnaissance ". It is reported that in some large multinational companies, each office has a camera. Every computer office path is under control, and all downloaded documents are recorded.

However, after all, not every organization can install a camera to monitor the Internet access of office staff. On the one hand, the cost is too high, on the other hand, employees will also be disgusted, reducing employees' loyalty to the company.

Therefore, for most enterprises, computer file leak prevention software is installed on employees' computers to prevent employees from leaking computer files. Server File Management software is installed on servers to prevent employees from unauthorized access to shared files, this is a necessary measure to protect the security of shared files.

For example, there is a "leak to computer file Leak Prevention System" (: http://www.grabsun.com/monitorusb.html), after the computer installation is complete, you can automatically disable the U disk, disable USB storage devices, at the same time, you can only use some USB flash drives to copy files from a USB flash drive to a computer instead of copying files from a computer to a USB flash drive, or you must enter a password to copy files from a USB flash drive, in this way, you can use a USB flash disk for normal operation and prevent USB flash disk leaks. As shown in:


Figure: Disable USB storage device software

In addition, the system can prohibit sending email attachments, uploading computer files to network disks, sending QQ files, and sending FTP files to prevent network leaks.

For file servers, many servers share files as intangible assets and trade secrets of the Organization. At the same time, shared files are often set for work purposes, this allows many LAN users to access confidential company information, in this way, it is easy to copy the shared file content when accessing these shared files, open the shared file, save it as a local disk, or drag the shared file to your computer, so as to leak important files on the server.

In this case, you can deploy the inventory to server shared file management system (: http://www.grabsun.com/gongxiangwenjianshenji.html), after installing on the shared file server, you can automatically scan all the shared folders on the server and all the login accounts on the server, and then you can set different permissions for different accounts to access the shared folder, you can disable the copying of shared files by reading shared files, saving shared files as local disks, modifying shared files, and deleting shared files, and prohibit the drag of shared files to prevent unauthorized access to shared files and protect the security of shared files. As shown in:


Figure: connecting to file sharing server software

In short, enterprises must adopt conventional management methods to prevent the departure of employees from taking customers away, prevent internal staff leaks, and prevent leaks of employees, on the other hand, we also need to give full play to the advantages of technical means. Only in this way can we maximize the security of the company's trade secrets and prevent the occurrence of leaks.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.