Start networking and exchanging professional insights

Register now or log in to join your professional community.

Obaid ur Rehman
by Obaid ur Rehman , HR Executive , Al Bahr Al Arabi Marine Engineering Services

By simply taking signature on undertaking regarding Confidentiality Obligations. it may include an email like

"Dear Team, As an employee of the company you have access to confidential and proprietary information included, but not limited to customer’s lists, contract terms, Methods of operations, project details including drawings, software specifications, codes, know how, financial information and marketing plan.

 

Under applicable law and under the term of your confidentiality agreement you are bound not to share such information during your employment even after leaving the company."

Omar Saad Ibrahem Alhamadani
by Omar Saad Ibrahem Alhamadani , Snr. HR & Finance Officer , Sarri Zawetta Company

Thanks 

In my opinion you need to set a strong system of communication between employees and departments, furthermore you should know when and for whom you will send the information.

Rogelio Balolot
by Rogelio Balolot , Chef , La Cuisine French Restaurant

There are types of information to be strictly secured by the company or management. The important  information (except policy and procedure that can be disseminated to anybody) should few has access on it using code or password and by laws those only on the top level and middle level managers so that  if the information leak happened its easy to trace the doer.

Marwan Mohamed Mahmoud Ahmed
by Marwan Mohamed Mahmoud Ahmed , Projects scheduling and Controlling Manager , WE - Telecom Egypt

I totally agree with My colleagues options 

Asim Ali Khan
by Asim Ali Khan , Human Resources Director , Arab Media Group

I agree with Mr. Omar..............

Shafiq Mallick
by Shafiq Mallick , Lead Security Consultant , Accenture Federal

 

  • Manage Technology Life Cycle

  • Establish a Password Security Policy

  • Back Up Data Frequently

  • Use Malware and Virus Protection

  • Secure Mobile Devices

  • Communicate Information Security Policies

  •  Close Holes in Security Policy

  • Restrict Access to all Data

  • Implement a Contingency Plan

  • Block Would-Be Intruders from the Network

 

Joe Seychell
by Joe Seychell , head of IT , Pinnacle Investment

Communicate it and automate password changes. Ensure your firewall rules are up to date. Have firewall policy to scan key words of main files or extensions (company customer DB, pricelist etc) Have penitratation testing done externally. Check access rights to cloud data Ensure past employee access is remove on departure. Remind staff of security policy. Remember over 80% of breaches are for an internal action or source - knowing this take appropriate security actions. Enforce policy

Rehan Khan
by Rehan Khan , L2 Security Analyst , SI Consult

By Securing the People, Process and Technologies. 

simon Toyiring
by simon Toyiring , REGIONAL SALES MANAGER NORTH ZONE 1 , FAREAST MERCANTILE NIGERIA LTD

You can use the gatekeeping system so that every information going out of company need to be filter before the audience can receive it.

Ashraf E. Mahmoud (PhD)
by Ashraf E. Mahmoud (PhD) , University Lecturer, Freelancer Consultant and Trainer for Int'l Business & Banking TF. , FreeLancer

Thanks for invitation,

- It is mandatory objective for "IT Sector / Department" in the organization to completely ensure "data and information protection" by setting all the needful restrictive procedures should applied by all the organization's staff, without any exception in this respect,

- Moreover, this is a very special vital objective to any organization, has to be well and hard controlled by the "Risk Management Department".

 

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.