Preview

Confidential Information

Satisfactory Essays
Open Document
Open Document
282 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Confidential Information
Confidential Information
IP of GP
Lena M Rayls
HRMT645-1101A-01 Operational Human Resource Management

Employees of your company will be privy to inside information not readily available to the public. Therefore, to protect this important information, a confidential information policy has been put in place. Our organization 's information classification policy will addresses two types of confidential information: competitive-advantage (trade secret) and personal information. Our employees shall be advised that all of the company’s financial information, business plans, marketing strategies, manufacturing routines, customers, and suppliers are considered trade secret information and property of the company. Violations of this policy are also known as espionage. There are laws in place to protect against the disclosure of this information or espionage. The Economic Espionage Act Of 1996 (EEA) is an act that makes theft or misappropriation of trade secrets a federal crime (LegalMatch, 2010). This act makes the act of stealing, selling, buying, or even possessing of a trade secret without authorization punishable by law.
The Personal Information section includes employee information and customer information. Customer information is entrusted to our care and we take this trust very seriously. Any violation of this policy will reflect poorly on our company’s ability to run a credible business. Employees will refrain from discussing company business with anyone outside the company in order to avoid an accidental violation of this policy. Internal consequences for violation of this policy can include immediate termination. On top of Internal Consequences, violators of this policy may also receive external consequences such as a fine, jail time or both." References:
LegalMatch. (2010). What Is the Economic Espionage Act of 1996? Retrieved January 23, 2011, from LegalMatch Web site: http://www.legalmatch.com/law-library/article/economic-espionage-act-of-1996.html



References: LegalMatch. (2010). What Is the Economic Espionage Act of 1996? Retrieved January 23, 2011, from LegalMatch Web site: http://www.legalmatch.com/law-library/article/economic-espionage-act-of-1996.html

You May Also Find These Documents Helpful

  • Good Essays

    Bis 220 Week 1

    • 470 Words
    • 2 Pages

    References: Do-Not-Call Implementation Act Law & Legal Definition. (n.d.). In Legal Definitions Legal Terms Dictionary. Retrieved February 12, 2013, from http://definitions.uslegal.com/d/do-not-call-implementation-act/…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Unit 3 P1

    • 1089 Words
    • 5 Pages

    Confidential information; all the confidential information must be kept in the office, which is locked from young people, it must be out of site from any young people looking…

    • 1089 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    was introduced in the third quarter of fiscal 2011. These spas for children offer hair and…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Breach of Confidentiality

    • 548 Words
    • 3 Pages

    Advanced Healthcare has strong emphasis on patient satisfaction, convenience and patient privacy. Advanced Healthcare has an EMR and LIS. Advanced Healthcare is a mid-size clinic with an Urgent Care Clinic. The staff in smaller clinics often has multiple functions. The employee involved was a lab tech who generally worked nights and weekends to support Urgent Care. She had access to Electronic Medical Record to be able to search for lab orders. During implementation phase: the lab orders are not all entered in EMR if the provider not present and the learning curve was that the MD compliance with entering an order.…

    • 548 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Programs, procedures, and policies, remain confidential to continue the success of the organization. Proprietary confidential information such as the following: Personnel files and lists, wage and salary information, medical information, substance-abuse testing, retirement account information, and benefits summary (U-Haul Hr, 2010). Each employee upon hiring stage signs a confidentiality agreement agreeing that he or she understands the importance of keeping information confidential (U-Haul Hr, 2010). By signing this agreement employees agree to protect this information and not disclose any information to any unauthorized outside parties, without written consent from the human resources department (U-Haul Hr,…

    • 748 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The hardest thing to deal with being inside a company, is when you lose one of your employees to one of your competitors. You worry if that employee is going to give inside information that could cause harm to your company. Companies should play fairly in the competition game and not spy on one another, communicate with one another, and not causing harm to others. The information that is given out could hurt the other company and you need to understand what is considered acceptable and unacceptable information ethically.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I will be more than happy to provide any information. However, we will need a sign form from the staff member authorizing for us to release confidential information. If you have a former employee verification form along with Ms. Laketha’s authorization signature would be great.…

    • 50 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Zephyr Pharmatec Ltd

    • 1518 Words
    • 7 Pages

    2. “Confidential Information” means information of a confidential nature (including trade secrets and information of commercial value) known to the Company and concerning the Company and the Products and communicated to the Distributor by the Company;…

    • 1518 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    References: Indiana University. (2012). Knowledge Base. What is the No Electronic Theft Act? Retrieved from: http://kb.iu.edu/data/aliv.html.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    I'm not talking about sabotage here; I'll address that later. By "espionage," I mean attempts to gather information through underhanded means for reasons other than identity fraud and other directly, criminally profitable purposes.…

    • 961 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Corporate Espionage

    • 438 Words
    • 2 Pages

    Because products tend to become obsolete much faster today than they did thirty or forty years ago, research and development are among the most important activities in modern business. However, it is an expensive activity. Some companies try to save money by paying people to conduct corporate espionage, that is, to spy on competitors' research and development operations. Is such espionage ever morally justifiable?…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Robinson, Jeffrey. "THE BLACK MARKET PESO EXCHANGE -." The Black Market Peso Exchange. 14 Apr. 2012. WordPress. 16 Apr. 2014 <http://www.jeffreyrobinson.com/blog/?p=62>.…

    • 1662 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Economic Offences

    • 3842 Words
    • 16 Pages

    Economic offences form a separate category of crimes under Criminal offences. These are often confused with White/Blue Collar crimes. Generally people belonging to upper economic classes are found involved in such crimes with the help of some unscrupulous and corrupt Government functionaries and advanced technology. Not only individuals get victimized with pecuniary loss in Economic Offences but such offences often, damage the national economy also and have security implications. The offences of Smuggling of Narcotic substances, Counterfeiting of currency and valuable securities, Financial Scams, Frauds, Money Laundering and Hawala transactions etc. evoke serious concern about their impact on the National Security.…

    • 3842 Words
    • 16 Pages
    Better Essays

Related Topics