Strategies for Protecting Trade Secrets in the Cloud

From the Experts

, Corporate Counsel

   | 2 Comments

Growing reliance on cloud computing has led to greater opportunities for trade secret theft as more businesses store such information in the cloud.

This article has been archived, and is no longer available on this website.

View this content exclusively through LexisNexis® Here

Not a LexisNexis® Subscriber?

Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via lexis.com® and Nexis®. This includes content from The National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at customercare@alm.com

What's being said

  • Alex

    I hope you guys are not using Dropbox or Gmail or Skype as these comms channels are proven to be unreliable and unsecure e.g. http://www.bbc.co.uk/news/technology-27285786

    DROPBOX OR BOX = "Disturbing Privacy Problem"

    John Landy, the chief security officer at Intralinks, wrote in a blog post that the flaw was a "disturbing privacy problem" and said web users should be wary of free storage services; I would recommend the likes of http://www.rtwhosting.com over public cloud providers such as Dropbox, Hotmail, or Gmail any day for business use.

    Users of Dropbox and Box cloud services have been warned that generating links to share information with others can put sensitive data at risk through several basic flaws.

    It is possible to access reams of sensitive data such as tax returns, bank records, mortgage applications, blueprints and business plans.

    The cost of data breaches was revealed by government research to be as high as £1.15m per incident, as firms face numerous threats to their data.

  • not available

    Companies often forget that email is a Cloud data transmission and storage service, and the single largest source of enterprise data leakage.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article# 1202643069354

Thank you!

This article's comments will be reviewed.