X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

This is the sixth and last in a series of columns on information security. Prior articles dealt with trade secret theft, ways to keep your data safe and with information security in light of the different types of technologies being deployed by companies. This article underscores the fact that despite all the technological advances with respect to information security, we are all human and often times represent the weakest link in securing data and other intellectual property.            

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.