a trade secret
The following signs may indicate that an employee is disclosing information that constitutes a CT:
Working without notifying management outside the established hours.
Of course, a desire to work is commendable, but if it is demonstrated by an employee who has never stayed an extra minute before, it makes sense to take a closer look at him. It is possible that he spends his non-working time copying and transmitting valuable information about the company's activities to competitors. If an electronic pass system is installed at the enterprise, then it will not be difficult to detect systematic presence at work outside the regime. It is desirable that in addition to being late at work, there is other information about the employee's dishonesty at the beginning of the inspection, otherwise unfounded suspicions can create an extremely unpleasant situation.
The employee maintains contact with colleagues from a competing company.
Often, episodes of disclosure band database of confidential information are discovered by accident. If all control is concentrated on specialists who may pose the greatest threat from the point of view of information security, the company will have to bear significant costs. Sharing experiences with colleagues in itself cannot cause harm, but it is better if the company's management is informed about such communication. You can check an employee by asking him a direct question about the disclosure of data and observing his reaction, or by establishing covert surveillance of him.
Signs of disclosure of commercial secrets
An employee saves information on an official computer that is not required for the performance of his job duties.
Many companies already use a fairly simple but effective method of controlling the circulation of classified electronic information. When an employee's work computer is turned on, a special program copies all the data stored on it to the server. This way, you can easily track which machine contained the confidential information and what operations were performed with it. This procedure can also be used in cases of accidental destruction of classified data.
The employee makes copies of local acts intended for official use.
Special copying devices that are capable of storing scans of documents that were copied on it in their memory will help here. Devices that require an access code to perform a copy are also used.
The employee does not comply with the internal regulations.
This refers to using a personal electronic device instead of a work one, visiting unwanted Internet resources, publishing information about the company's activities on social networks, etc. DLP systems help to identify such facts by checking the content of correspondence conducted on a work computer, e-mail. To prevent equipment from being infected with viruses, it is useful to establish a rule according to which the installation of any program on a work computer is carried out only with the consent of the information security department. But here you should not go too far. It happens when, under the pretext of restricting access to commercial secrets, employees are required to hand over not only smartphones, but also any personal items at the beginning of the working da