• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Student360
  • About
    • Secure360
    • UMSA
  • Secure360 2022
  • For Sponsors
  • For Speakers
  • Get Involved
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Protecting Your Data When an Employee Leaves the Company

Key Learning Points

  • Understand that one of the biggest threats to intellectual property is when an employee, especially an executive, exits the company.
  • Learn best practices for dealing with employee exits
  • How to deal with employees from a personnel perspective
  • What technologies to use to ensure that your data is protected
  • Understand the roles of both HR and IT in the employee exit process

Level Intermediate

What is the biggest insider threat to your company? Many experts believe it is during that critical period when an employee decides to leave. Two high profile cases at Lyft and Chesapeake Energy have shown the severity of damage that could happen when you don’t have policies in place to protect your intellectual property when an employee leaves, especially an executive. Most companies have developed rigorous policies and procedures to interview and screen potential employees they are going to hire, but many companies neglect the second half of the equation. What do you do when an employee leaves? Do you exercise the same rigor in protecting your company’s sensitive data during the exit period?

 Protecting your valuable intellectual property during the exit process includes three important parts. First, a process to review the Confidentiality and Intellectual Property Agreements with the departing employee in advance of departure and require a certification that all confidential information in the employee’s possession has been returned and/or destroyed. Second, conduct a thorough review of the employee’s online activity during the 30-day period preceding notice of resignation or termination. Third, provide counsel to the departing employee that reinforces the ramifications of sharing unauthorized information or access to computers, user fields, or mobile devices.

 This session will discuss the risk associated with departing employees, including those who leave voluntarily or are fired. Attendees will learn what policies need to be in place to ensure proper protection of your intellectual property. What technologies are needed to document what actions employees have taken before they leave, and how you can ensure that your company data has been protected—or hasn’t been compromised. Finally, this session will include a discussion of the roles of both HR and IT in the employee exit process.

About Michael Tierney

Mike Tierney, Chief Operating Officer, is responsible for the day to day operations of the company, as well as the overall product strategy. Prior to joining Veriato, Mike oversaw a large product portfolio that included solutions for desktop security, least privilege management, file access control and reporting, and compliance. Mike also has responsibility for Operations, and in this capacity deal with the same issues facing most companies: improving security and productivity while respecting user privacy.

This session sponsored by Veriato. 

 

Primary Sidebar

Details

Wednesday May 18, 2016
9:45 AM - 10:45 AM
Room 3
Focus: Cybersecurity

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2022 Secure360. All rights reserved.