17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1 – Understanding Sensitive Data"… Whoever, with intent to convert a trade secret, that is related to orincluded in a product that is produced for or placed in interstate or foreigncommerce, to the economic benefit of anyone other than the owner thereof,and intending or knowing that the offense will, injure any owner of thattrade secret, knowingly -- (1) steals, or without authorization appropriates,takes, carries away, or conceals, or by fraud, artifice, or deception obtainssuch information; (2) without authorization copies, duplicates, sketches,draws, photographs, downloads, uploads, alters, destroys, photocopies,replicates, transmits, delivers, sends, mails, communicates, or conveyssuch information; (3) receives, buys, or possesses such information,knowing the same to have been stolen or appropriated, obtained, orconverted without authorization; …"Laws regarding trade secrets are often focused on the disclosure of informationrather than the storage of it; but the control of disclosure begins with protectingthe stored data. As with any sensitive data the access controls to the data arehighly critical in any protection efforts. Granting access to only those userswho need access to the sensitive data, on an as needed basis, is a good practice.Careful consideration of how data is presented when including trade secretinformation on reports or spreadsheets that are drawn from databases is also animportant aspect.Group Dynamics of Sensitive DataA standard wooden spoon that sits within the kitchen drawer is rather harmlessand holds no special intrigue. A two liter bottle of cola offers little moreexcitement beyond its momentary burst of enthusiasm when first opened; butwhen the harmless wooden spoon is dipped into the boring two liter bottle ofcola it is bedlam! A tall column of caramel liquid rushes towards the sky anddrapes its stickiness over everything within its range.A similar effect can be achieved with data. As a single piece of data, your dateof birth is just one of the 365 days that are on everyone's calendar. However,given added context, such as your name, the date of birth becomes data that ishighly valuable to someone who is attempting to steal your identity. From thissmall start, an identity thief can discover additional information that can beused to make their exposure of your sensitive data complete. Add your mother'smaiden name, along with place of birth, and a certified copy of a birthcertificate could be obtained which can result in the acquiring of validpassports, driver's licenses and Social Security cards.32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!