Dear All,
I want to know what methods can be used to protect the confidential data from being leaked by exiting employees. Sometimes, employees carry information on CDs, pen drives, etc., when they leave. How can we protect against this? Any suggestions, please?
Regards,
Shilpi
From India, New Delhi
I want to know what methods can be used to protect the confidential data from being leaked by exiting employees. Sometimes, employees carry information on CDs, pen drives, etc., when they leave. How can we protect against this? Any suggestions, please?
Regards,
Shilpi
From India, New Delhi
Strange, forum members have no ideas or suggestions for this very common problem. Please share your views, ideas, or suggestions to help solve my problem. It would be great if you could share any practices adopted by your respective companies regarding this issue.
From India, New Delhi
From India, New Delhi
Good question. Many enterprises are facing this problem. Some IT solutions are available in the market that can prevent employees from copying, printing, sending emails, using MSN, or taking screenshots of confidential files and data. These solutions can also trace back to identify the individuals responsible for these actions. However, implementing such solutions can be expensive and challenging. It's a complex issue to discuss comprehensively here.
One simple method is to disable USB and DVD drives, but there are many loopholes associated with this approach.
Please let me know if you need further assistance or more details on this topic.
From Macao, Macau
One simple method is to disable USB and DVD drives, but there are many loopholes associated with this approach.
Please let me know if you need further assistance or more details on this topic.
From Macao, Macau
Rightly said Diabling Drives do have loopholes so what should we do? Can we go for some agreement which says about it or some Ethical Policy...................... Regards, Shilpi
From India, New Delhi
From India, New Delhi
Dear Ms. Shipli,
Season's Greetings. Kindly contact me via email for your posted query. My email address is sachinrgi@gmail.com.
Sachin G.
Lead 3 - Project Leader,
IT Network Security Specialist,
Asia Pacific Region, Google.
From India, Nagpur
Season's Greetings. Kindly contact me via email for your posted query. My email address is sachinrgi@gmail.com.
Sachin G.
Lead 3 - Project Leader,
IT Network Security Specialist,
Asia Pacific Region, Google.
From India, Nagpur
It depends on whether you *REALLY* want to protect the data or not. Most of the company's contracts include terms of NDA (Non-Disclosure Agreement). If you just want to have normal procedures for HR's responsibility, then work on the NDA or Ethical Policy. You will feel better, but the data will leak out as usual.
I have worked on this topic before, and as far as I know, there is no solution that can 100% prevent data leakage. We can only try our best to protect the data.
From Macao, Macau
I have worked on this topic before, and as far as I know, there is no solution that can 100% prevent data leakage. We can only try our best to protect the data.
From Macao, Macau
Hi Shilpi,
I do have software to protect the use of USB/DVD/CD RW/Floppy... But it would be a problem to implement it in all the systems of your company. Probably, if you have any system administrator, you can take his help!
Please find the description for the same and revert to me if interested!
Prevent information loss due to the unauthorized use of USB Removable Drives (Flash sticks, iPods, mp3, mp4), CD-ROM, CD-RWs, and Floppy. USB LOCK AP, with its simple and straightforward interface, has been designed with careful consideration to its effectiveness and usability.
Effective: USB LOCK AP is the tool of choice if you need to prevent information loss due to the unauthorized use of USB storage removable drives, CD-RWs, and Floppy, without blocking other USB devices like printers, mice, cameras, etc.
It is suitable for either home or business use (in cases when the user is allowed to manage his or her own security). Its anti-hack security works as a Windows Service at the Local System level, allowing the program to effectively run even on computers with no privileges.
Easy to use: USB LOCK AP allows the user to authorize or restrict, at his or her convenience, the use of USB storage removable drives, all CD-ROM/CD-RW drives, and Floppy Disk drives from its very easy-to-use, password-protected interface.
From India
I do have software to protect the use of USB/DVD/CD RW/Floppy... But it would be a problem to implement it in all the systems of your company. Probably, if you have any system administrator, you can take his help!
Please find the description for the same and revert to me if interested!
Prevent information loss due to the unauthorized use of USB Removable Drives (Flash sticks, iPods, mp3, mp4), CD-ROM, CD-RWs, and Floppy. USB LOCK AP, with its simple and straightforward interface, has been designed with careful consideration to its effectiveness and usability.
Effective: USB LOCK AP is the tool of choice if you need to prevent information loss due to the unauthorized use of USB storage removable drives, CD-RWs, and Floppy, without blocking other USB devices like printers, mice, cameras, etc.
It is suitable for either home or business use (in cases when the user is allowed to manage his or her own security). Its anti-hack security works as a Windows Service at the Local System level, allowing the program to effectively run even on computers with no privileges.
Easy to use: USB LOCK AP allows the user to authorize or restrict, at his or her convenience, the use of USB storage removable drives, all CD-ROM/CD-RW drives, and Floppy Disk drives from its very easy-to-use, password-protected interface.
From India
With information stored in a variety of security levels and locations across the network, access rights are numerous. It is advisable for a company to maintain a document that lists each employee's access to the company's information systems.
One more thing is to image the employee's hard drive when they leave just for security measure. Computer forensics experts can obtain a "mirror-image" of a hard drive, and businesses can keep a copy of the imaged drive for a period of time. After suspecting that an employee is leaking information, experts can trace the activities that have taken place on his/her hard disk. This is what we call ediscovery.
From India, Mangaluru
One more thing is to image the employee's hard drive when they leave just for security measure. Computer forensics experts can obtain a "mirror-image" of a hard drive, and businesses can keep a copy of the imaged drive for a period of time. After suspecting that an employee is leaking information, experts can trace the activities that have taken place on his/her hard disk. This is what we call ediscovery.
From India, Mangaluru
Mr. Sachin,
It seems you don't want to share knowledge publicly regarding the subject topic. That's why you asked to contact on your email. However, this will be unfair to other people. You should share the remedy for this problem with everyone if you truly have the solution.
Purshottam Saini
From India, Calcutta
It seems you don't want to share knowledge publicly regarding the subject topic. That's why you asked to contact on your email. However, this will be unfair to other people. You should share the remedy for this problem with everyone if you truly have the solution.
Purshottam Saini
From India, Calcutta
Hello, I've taken all confidential information from the places where I have worked. The best way to do this is once you decide you're going to resign, before giving resignation, collect all data on pen drives, CDs, and take it home easily. As an employee, you have been given the right to use pen drives, DVDs, CDs, etc., so no one can dare, and no one did stop me. I have all information of my past work, whatever I did in my old company, which I can refer to in the future.
After collecting data, give a resignation letter, and no one will block your access. If they block it, they are shooting themselves in the foot because I will tell you only to block the access to pen drives, CDs. How do I take a backup for your future reference? So, if you have brains, you can do anything. I have brains, and I do as I please, hehehehehe.
From India, Pune
After collecting data, give a resignation letter, and no one will block your access. If they block it, they are shooting themselves in the foot because I will tell you only to block the access to pen drives, CDs. How do I take a backup for your future reference? So, if you have brains, you can do anything. I have brains, and I do as I please, hehehehehe.
From India, Pune
Looking for something specific? - Join & Be Part Of Our Community and get connected with the right people who can help. Our AI-powered platform provides real-time fact-checking, peer-reviewed insights, and a vast historical knowledge base to support your search.