Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Traditionally, privacy and cybersecurity efforts have focused on how companies can protect their IT assets from intrusion. Literally billions of dollars have been invested in developing security measures that limit and control access to servers, workstations, laptops and mobile devices. But in today’s cloud-computing environment, these extensive (and expensive) efforts may not be sufficient. The true objective is not to protect the IT assets, but the data that they store. And with increasing frequency, employees are storing sensitive, proprietary data on assets that their companies do not control. Thus, to capture and address this extra-company activity, a comprehensive approach to data privacy and cybersecurity needs to be data-centric rather than asset-centric.

ALM Legal Publication Newsletters

Sign Up Today and Never Miss Another Story.

As part of your digital membership, you can sign up for an unlimited number of a wide range of complimentary newsletters. Visit your My Account page to make your selections. Get the timely legal news and critical analysis you cannot afford to miss. Tailored just for you. In your inbox. Every day.

Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.