Fact or fiction: Don't forget about your intellectual prop

By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Check out the expert Podcast featured here and learn more about creating an effective enterprise data protection framework for your organization. Personally-identifiable information (PII) must be protected as mandated by a myriad of regulations. But some organizations overlook the need to protect intellectual property. In this Podcast, we'll explain some of the common misunderstandings about the legal protections for trade secrets and offer you a set of best practices to get started.

SearchSecurity.com Security School
 

This podcast is a portion of SearchSecurity.com's Data Protection Security School lesson, Executing a data governance strategy. Visit the lesson and school pages for additional learning resources, or visit our Security School Course Catalog to begin other lessons.


By creating a data protection plan, security professionals are able to ensure valuable data remains under control and make more effective use of the assets within a company. Check out the expert Podcast featured here and learn more about creating an effective enterprise data protection framework for your organization.

Personally-identifiable information (PII) must be protected as mandated by a myriad of regulations. But some organizations overlook the need to protect intellectual property. In this Podcast, we'll explain some of the common misunderstandings about the legal protections for trade secrets and offer you a set of best practices to get started.

 

This was first published in May 2008

Dig deeper on Information Security Policies, Procedures and Guidelines

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close