It used to be that an employee desiring to steal $2 million from your company would have a hard time doing so unnoticed. Today, that employee can do so undetected while having a casual conversation with you in the office.

Up until recently, sophisticated firewalls and password protection have been relatively sufficient to protect sensitive company information. Now, these measures are anything but sufficient. The proliferation of electronic devices such as iPods, camera cell phones, thumb drives, Blackberries, flash drives and all other sorts of downloadable devices have made all companies at risk for insider theft right under their proverbial noses. With the use of these devices, downloading significant amounts of data is easy, virtually instantaneous and often very difficult to detect.

This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.

To view this content, please continue to their sites.

Not a Lexis Advance® Subscriber?
Subscribe Now

Not a Bloomberg Law Subscriber?
Subscribe Now

Why am I seeing this?

LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.

For questions call 1-877-256-2472 or contact us at [email protected]