New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 990
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Security HeadLines: Protecting company data from ex-employees (recent) image
Networks
Protecting company data from ex-employees
by Eric J. Sinrod

While companies are relatively accustomed to requesting the return of building keys and ID cards from departing employees, they are less vigilant when it comes to electronic data. Can this lead to problems? Yes!

When employees are terminated involuntarily, emotions can run high on both sides of the table. The people in charge of the termination may feel quite uncomfortable. Their entire focus may be on calming the terminated employee and making sure the person leaves the building without incident. While building keys and ID cards likely will be requested for return, it is quite possible that company personnel will forget right away to disable the former employee's access rights to the company's information systems.

The danger

In a case like that, a terminated employee could sit down at an off-site computer and have remote access to the company's information system. But now there's an added factor: the terminated employee may harbor a grudge against the company or may want to take advantage of proprietary company information for career pursuits.

Terminated employees could seek revenge by attempting to delete or alter important data stored on the company's information systems. Or they could seek to steal the crown jewels of the company — its intellectual property stored on its information systems.

Once employees are terminated (or even when they depart voluntarily), companies immediately must disable their access rights to information systems. Even a lag of several days, which is not uncommon, can lead to serious consequences.

For companies of all sizes, it is important to maintain an organizational list or directory that documents the various levels of access employees have to the company's information systems. Once any of those employees departs the company, the company then should be in a position to disable all applicable access rights.

When it is known in advance that employees will be leaving on a certain date, the company can build in automatic stop dates, which ends access rights to information systems on that date.

Companies would be wise to have the manager who has supervised specific, departing employees to complete and sign off on a checklist which demonstrates that access rights to information systems have been disabled. This helps ensure that a live human being actually takes care of this before a problem occurs.

Burden vs. benefit

Of course, it is a burden to add yet another responsibility to managers when it comes to dealing with departing employees. However, the increased burden is slight when compared to the havoc that could be wreaked in its absence.

This article first appeared on Law.com.

Eric Sinrod is a partner in the San Francisco office of Duane Morris (www.duanemorris.com), where he focuses on litigation matters of various types, including information technology disputes. His Web site is www.sinrodlaw.com, and he can be reached at [email protected]. To receive a weekly e-mail link to Mr. Sinrod's columns, please send an e-mail with the word Subscribe in the Subject line to [email protected].

usatech
Posted on Saturday, 27 September 2003 @ 05:00:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Intel
· HotScripts
· W3 Consortium
· More about Networks
· News by phoenix22


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register