15 Details Of Reducing Commercial Leaks
corporate espionage
In the eyes of most entrepreneurs, it's just the plot of the film and the detective story. However, as your company grows bigger and bigger, the fact that you don't want to face is threatening your company.
In fact, as long as a little attention to the details of the following work, black hands can not succeed.
A man once joked, "there are three secrets in the world that people do not know: the wealth of the queen, the weight of Brazil star Ronaldo and the secret of Coca-Cola."
The first two may be relatively unfamiliar, but Coca-Cola's secret recipe, known by all the earth people, is a highly confidential company. Its confidentiality constitutes part of Coca-Cola's myth.
Everyone says, "shopping malls are like battlefields".
Business information
Of
secrecy
Become the top priority.
In fact, in the pervasive peek of commercial espionage, every minute, nearly 2 enterprises in the world fail because of information security problems, and 11 enterprises cause millions of direct economic losses because of information security problems.
Recently, Coca Cola Co's internal staff selling the formula is evidence.
Terrible! If you don't want your company to be the next, then you have no choice but to keep your business secret.
To guard against
an inside thief
As the saying goes, "it's hard to prevent domestic thief". In fact, pay attention to these.
details
He can get nowhere.
1. printer, the old office equipment, but also the culprit of leakage.
Even a laser printer has a delay of more than 10 seconds. If you don't watch it, the first person to see the file may not be you.
Most modern companies use public printers and put printers, photocopiers and other equipment in a relatively independent space.
As a result, confidential documents between departments begin formally from the equipment room and spread in other departments.
When there is no secret between departments, the company will have no secrets.
Reminder: hold your printer. If you want to go to the toilet, don't use the co-ordination method to press the print button before you go to the toilet, saving only tens of seconds, and losing more.
2. print the back of the paper - the great loss of good habits.
Saving paper is a good habit of many companies. Employees tend to be proud to use printed paper on the back.
In fact, if one of our conscientious people collects "waste paper", we can easily know the decisions of the board of directors and the decisions of the office.
It is both detailed and accurate, and a copy of the leading document is presented.
Reminding: don't wear a frugal hat for important documents, and bring them into the ranks of waste!
3. computers change hands, understand the best channel for new companies.
Almost all white-collar workers have had this experience: if they are new to a company, roaming in their former computers is the best way to get to know the new company.
In a state of "snooping", a lot of things can be seen from the company's past customer records, rewards and punishments system, and even previous resignations.
All historical secrets are revealed.
Reminder: the management of the computer department (if the company is too small, then the boss) will empty the work material and format again, and be careful to drive the boat for ten thousand years. Besides, it is only a matter of effort.
4. sharing - making good documents and notifying the thieves.
You must have done this kind of thing: put the files on the computer after sharing, yell, "the files are shared, take them by yourself", and the other side will answer out after the response.
Yes, it's a good method. But after you share it, do you remember to delete it? Did the other party delete it? Ask 100 people, about 90 people dare not say that they have all deleted, a lot of things, who remember this?
Reminder: or do not share, if you want to use, remember to delete your shared files, or prompt a "finished copy."
5., the new training - without reservation will only be disappointed.
When new employees enter the company, most of them will be honest with new employees.
Starting from the first day, in the name of "faster integration into the team", new employees began to get involved in all operations except finance, from corporate strategy to tactical tactics, from core customers to key technologies.
But in fact, more than 1/5 employees will leave the company after 3 months.
Your competitors know you only because of a job fair you held.
Reminder: training is a good thing, but for new employees, the most important thing is basic training, not all information.
6. fax machine - miss is often the most important.
Fax is never in time, especially with the use of a public fax machine. You are often too eager to miss the fax.
You must have asked the other party to send it back. At the same time, you must have taken the important fax that others or even led.
And the most important information is likely to flow out through this channel.
Reminder: once the fax machine is public, it means that you should be careful of "information distortion". The best way is also the most stupid way. If you have no special person, you may as well be a "farmer" waiting for a rabbit.
7. public equipment is not equal to public information.
People often share U disks, floppy disks or laptop computers.
If the "heart person" lend the U disk to the company's financial affairs, it may easily get the company's profit and loss statement and tax details during the return of the company.
Business competitors can thoroughly identify your home and even report tax evasion to the tax authorities.
Reminder: the general equipment in the Department should set permissions. Before using the public equipment, we must clear the work. This is also responsible for the use of public equipment.
{page_break}
8. CD burning - data is lost during the backup process.
If you want to take away the company's information, the best way is to apply for CD backup, make the file in a specific format, give it back to the network administrator, then claim that it can not be opened normally, and ask for a backup. In most cases, the "discs" left in the CD-ROM can be brought out of the company after work.
Reminder: CD-ROM backup should be cautious and strictly controlled. Network administrators should be responsible for their own supervision. In order to ensure their careful and responsible work, supervision should be included in daily work assessment.
9. meeting minutes - neglected gold.
Secretaries often see minutes of meetings very often. They do not know what a high-level meeting record means to their competitors.
Companies often see people throw away the minutes as waste paper, leaving the company's latest strategic information in any corner of the enterprise.
Reminder: secretaries do not have safety awareness. At least, professional abilities should be interrogate. Hasten to greet your secretary. Next time do not draw cartoons on your records.
10. customers, your secret may become a poor evidence of customers' knowledge after drinking.
Some customers like to quote the classics to prove their wisdom, and now popular theories are combined with practice, so when you are enjoying yourself for a while, some of your secrets that you should know from heaven and earth are exposed frequently in various forums, interviews and entertainment.
Reminder: we can't expect all people to be saints, but we can't laugh at our privacy and company secrets repeatedly.
If it is unavoidable to let customers know about company secrets, a good friend will also ask him to sign a notarized confidentiality agreement, and rely on a thick agreement and irregularities to remind him to abide by professional ethics.
11. one week after entry - the new student's learning period.
In the first week, the newcomer collected data 5 times as much as usual. He was always in a crazy copy and pmission state to familiarize himself with the company.
Only in this week, he was ready to leave.
Watch out for your new employees, no matter how much you admire him.
Reminder: if the information level system is set up, then it is only a corner scrap.
12. half a month after cooperation, the common practice of competitors to steal information.
Fake customers, in the first half of the cooperation, your caution in information security can only show that the business is rigorous and can win the understanding and respect of most customers.
Unless he is your competitor.
Remind: cooperative people are not distant guests, many minds, always right.
13. private computers -- the necessary means to steal company information for a long time.
Just bring your laptop to the unit and connect to the LAN for half an hour. There are 1 G files that can be easily taken away.
Reminder: please send out the information limit.
Vigilance against foreign aggression
Robbers armed with knives and robbers are often few, but there are always many kinds of hypocritical clothes and agents who cooperate with each other.
14. publicity and reception -- "active" divulge.
Many units or organizations in the external publicity and reporting, for fear that people do not know the overall, not specific, in the reception process, for fear that people are not enthusiastic, responsive.
Unknowingly, a secret leak was made.
An electronic enterprise in China has successfully designed a highly sensitive international electronic signal receiving feeder. Foreign businessmen are very interested in it. After signing a joint venture production letter, the Chinese side neglected to keep secret, received many visits from other countries, provided information, and produced similar products in the Americas after the foreign party had mastered all the technology and technology. The letter of intent was a mere scrap of paper.
Reminder: the guests may also be insidious with jackals.
The most hateful thing is that good entrepreneurs tend to relax their vigilance against guests who are under the banner of attracting investment, attracting investment, business negotiation, tendering, and so on. They are good to eat and drink. They are afraid of not being able to entertain. Therefore, some motivated comrades take the opportunity to take pictures and take pictures of the production equipment and technological process by visiting the inspection machine, and ask questions about key technologies, obtain relevant information and steal business information.
15. under the guise of joint ventures and cooperation, stealing money is introduced under the way of introducing capital.
Many Chinese enterprises have suffered from joint ventures and real theft.
In the common Sino foreign joint venture, the foreign party is invested in capital, and China's share in technology, land and factory buildings is a common investment way.
But for what technology shares, how to protect secret technology is forgotten or ignored, and a careless technology is flickered out.
A large Petrochemical Industries Co Research Institute jointly formed a joint stock company with a foreign company in the course of west east gas pmission. The Petrochemical Industries Co shares its shares in its proprietary technology, accounting for 20% of the shares.
However, joint-stock companies collapsed in less than half a year, and the technological achievements of the Institute did not get any return. Other partners, however, managed to build factories on their own by virtue of the technology, and they were very profitable.
Another example is that a grain and oil company in a city has made breakthroughs in the technological pformation of peanut processing equipment. Due to the neglect of confidentiality, no measures have been taken to protect the trade secrets, and a Japanese company under the guise of cooperation has already acquired technical information. Others have applied for a patent first, and in turn accuse us of infringement, demanding compensation.
Reminder: even if the joint venture and cooperation are successful and your technology patent is counted as money, you must understand that if the joint venture partner is dishonest, the technology will not necessarily be effective, or even be stolen by others.
Choose a joint venture partner carefully, and don't think everything is OK because the other party agrees to your technology stake. {page_break}
Take preventive measures
Tracing the origin, information theft often happens.
Since we can not put an end to the ugliness of the external environment and eliminate the worries of thieves, we can only start with the source of internal information and establish a complete and complete information confidentiality system.
After all, containment is not a way to prevent leakage.
1., cut off the source and set up the information level system. The level of classified documents should be classified. For example, contracts, customer contacts and shareholders' situation should be classified as a level, and the scope of confidential communication should be determined so that everyone can understand the boundaries of information dissemination. Employees should determine the corresponding information level by their posts, and the low level post level can not read, understand, copy and contact high-level information levels.
2., pay attention to confidentiality agreements - no rules, no Cheng Fangyuan, no matter what the size of the action is, and the signing of a clear confidentiality agreement with employees is necessary. The more detailed the details of the confidentiality agreement is, the better it will be if the other party is honest.
3., the decomposition of responsibilities - to clarify the safety responsibility of each person to the relevant information. If all confidential documents leak, we can find responsible persons according to the regulations.
4. technology theft prevention, for example, SIEMENS company prevents employees from copying company information from hardware devices. According to the level distinction, most employees of the company are unable to install floppy drive and mobile hard disk interface. IBM company stipulates that every employee has only three access to the same document, and the three time, place and reason for the visit will be strictly recorded.
At the same time, some companies' equipment always reminds employees to pay attention to protecting business secrets.
For example, there will always be such a reminder in some Apple computer company venues: "please erase the blackboard and dispose of all your secret documents. The industrial spies have booked the room after you."
The shredder is placed near the office area of SHARP every day, and employees need to process all the waste paper they used.
5. the theft of technology, the production of "technology mole", has led to a variety of means of using technology to obtain business secrets. Therefore, enterprises should also configure the necessary preventive facilities to improve their ability to prevent technology. For example, choose low radiation communications and office automation equipment; install alarm, electronic monitoring system and physical shielding in relevant secret locations or regions; configure computer video protectors and disk degaussing devices.
In the information age, we need to strengthen the confidentiality of information. Our entrepreneurs can act immediately, carefully check the above details and dig for introspection, so that your business secrets will be greatly reduced by the enemy.
- Related reading
- Domestic data | The January 9Th Australian Wool Comb (70S) Commodity Index Was 102.45.
- Domestic data | Nylon POY Commodity Index Was 72.57 In January 9Th.
- Domestic data | Nylon FDY Commodity Index Was 78.68 In January 9Th.
- Domestic data | Nylon DTY Commodity Index Was 73.53 In January 9Th.
- Domestic data | Dry Cocoon (3A Or Above) Commodity Index Was 191.46 In January 9Th.
- Domestic data | Polyester FDY Commodity Index Was 60.93 In January 9Th.
- Domestic data | Polyester DTY Commodity Index Was 81.10 In January 9Th.
- Domestic data | Polyester POY Commodity Index Was 54.32 In January 9Th.
- Domestic data | Polyester Staple Fiber Index Was 86.44 In January 9Th.
- Domestic data | The Spandex Commodity Index Was 78.18 In January 9Th.
- Ways To Overcome Inferiority Complex
- Ten Ways To Start A Business From Scratch
- 11 Principles To Enhance Self-Confidence
- 如何順利度過職場“停電期”
- 上班族的經(jīng)典哲學(xué)
- What Causes Your Career To Stagnate?
- Marketing Plan Book
- “老干媽”陶華碧的成名史
- Mechatronic Online Prize Winning Activities Officially Launched &Nbsp; Million Yuan Award For You.
- HR'S Top Secret: 20 Companies Will Never Tell You The Hidden Rules.