{"id":333,"date":"2017-10-01T12:30:48","date_gmt":"2017-10-01T16:30:48","guid":{"rendered":"https:\/\/ipmanagement.harnessip.com\/?p=333"},"modified":"2017-10-01T12:30:48","modified_gmt":"2017-10-01T16:30:48","slug":"technology-policies-protect-the-company-and-its-ip","status":"publish","type":"post","link":"https:\/\/ipmanagement.harnessip.com\/?p=333","title":{"rendered":"Technology Policies Protect The Company and its IP"},"content":{"rendered":"<p>A computer and technology policy is an important part of protecting and managing intellectual property. \u00a0A business should consider establishing a policy addressing the following points:<\/p>\n<p><strong>Use of Company Technology<\/strong><\/p>\n<p>The technology provided by the company, including computer systems, communications networks, company-related work records and other electronically stored information in general should be used for only for the business of the company. Whatever the purpose, employees should be prohibited from\u00a0transmitting, retrieving, or storing any communications or other content of a defamatory, discriminatory, harassing or pornographic nature. No messages with derogatory or inflammatory remarks about an individual\u2019s race, age, disability, religion, national origin, physical attributes or sexual preference may be transmitted. Harassment of any kind should be prohibited.<\/p>\n<p><strong>Restricted Access to Computer Systems and Data.<\/strong><\/p>\n<p>The \u00a0Federal Computer Fraud and Abuse Act (18 U.S.C.\u00a0\u00a71030) provides protection against the improper accessing of computer systems and data, but the key to its protection is that the access is unauthorized. \u00a0Because an employee is generally authorized to access the company&#8217;s computer system, the protections of the CFAA are frequently held not to apply to the actions of employees. \u00a0By carefully defining what employees are authorized to do with the company&#8217;s computer systems and data, and what an employee is not authorized to do, the company may be able to extend the protections of the CFAA to disloyal that activities of disloyal employees.\u00a0 Many states have laws that parallel the CFAA, for example Missouri&#8217;s Computer Tampering Statute Mo.Rev.Stat. \u00a7537.525.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Unlicensed Software<\/strong><\/p>\n<p>Employees downloading, installing, and running software can jeopardize the company&#8217;s computer system, and their installing and running\u00a0<em>unlicensed<\/em> software can create substantial copyright liability.\u00a0 Civil damage awards of up to $150,000, plus attorneys\u2019 fees and costs, are possible as well as criminal penalties including substantial fines and imprisonment.\u00a0 Employees should be restricted from downloading software and plug-ins without permission from IT, and Employees should be prohibited from installing unlicensed software on company computers.\u00a0 Employees should further be prohibited from using unlicensed software on their personal computer to perform work for the Company.<\/p>\n<p><strong>Copyrighted Material<\/strong><\/p>\n<p>Copyrighted materials belonging to third parties should not be transmitted or stored on the company&#8217;s network without permission of the copyright holder. Employees should be encouraged to share links rather than actual copies.\u00a0 Employees should be educated about the limits of fair use an incorporating copyrighted materials into company work product.<\/p>\n<p><strong>Social Media<\/strong><\/p>\n<p>The company should consider whether it wants employees posting anything about the company (good or bad).\u00a0 Even well-intentioned posts can interfere with the coherent message that the company is trying to project.\u00a0 At a minimum the company should instruct employees about the message that the company is trying to project on social medial.<\/p>\n<p>The company should also consider whether it wants employees to identify themselves as employees of the company when participating in social media. Views expressed by employees could be attributed to the company by the mere fact of their employment,<\/p>\n<p><strong>Using Company email and email Addresses<\/strong><\/p>\n<p>The company should consider whether it wants employees using company email and in particular a company email address in conducting personal business.\u00a0 Having the company&#8217;s email address associated with on-line postings could result in the employee&#8217;s personal opinions being attributed to the Company.\u00a0 Email is also a tool for stealing electronic files.\u00a0 The company should monitor employee emails, and advise employees that they are doing so.<\/p>\n<p>Employees should be regularly reminded that company emails are business records that may be discoverable, and their content should be prepared accordingly<\/p>\n<p><strong>No outside media<\/strong><\/p>\n<p>Not only are flash drives and similar devices a tool for stealing electronic files, but they are a vector for computer viruses and other malware.\u00a0 However they are beneficial and convenient and a complete prohibition could interfere with the proper conduct of the business.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A computer and technology policy is an important part of protecting and managing intellectual property. \u00a0A business should consider establishing a policy addressing the following points: Use of Company Technology The technology provided by the company, including computer systems, communications &hellip; <a href=\"https:\/\/ipmanagement.harnessip.com\/?p=333\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[],"class_list":["post-333","post","type-post","status-publish","format-standard","hentry","category-policies"],"_links":{"self":[{"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/posts\/333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=333"}],"version-history":[{"count":2,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/posts\/333\/revisions"}],"predecessor-version":[{"id":336,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=\/wp\/v2\/posts\/333\/revisions\/336"}],"wp:attachment":[{"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipmanagement.harnessip.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}