Protecting Confidential Information And Trade Secrets From Defecting
Employees - Employment and HR - United States
As a first step, companies should consider which employees need access to
what information. Once the determination is made, employers should require
passwords to access any company computer, and use additional passwords to
restrict employees who do not need to view more sensitive company
information. Some companies are even employing voice-recognition software
and more advanced methods of confirming identities before allowing access
to more sensitive information. In addition, businesses can consider
encrypting files and folders that they do not want easily accessed.
http://bit.ly/18in8yU
Source:
http://www.mondaq.com/unitedstates/x/278600/employee+rights+labour+relations/Protecting+Confidential+Information+and+Trade+Secrets+from+Defecting+Employees
See if people are clicking on this link: http://bit.ly/18in8yU+
Try the bitly.com sidebar to see who is talking about a page on the web:
http://bitly.com/pages/sidebar
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]