Email: iumanskiy@kroll.com
Website: www.kroll.com

v14i7_Kroll

Managing and protecting intellectual property (IP) can be a complex undertaking. Often, IP is viewed too narrowly — in many cases only as something intangible. Yet experience shows that IP is quite multi-faceted and practitioners have to think in three dimensions — mental, physical and digital — to fully grasp IP’s potential vulnerabilities. Our mobile phones are a good example. Their manufacturers certainly have people who know about highly sensitive attributes of the product (mental); proprietary information about the phone’s design and manufacturing most likely exists in printed form (physical); and nearly all of the aforementioned information about the device is stored on the network and personal computers within the organisation (digital). Protection of IP can be consistent only when sufficient controls are applied in all three dimensions.

Streamlining IP management
Think of IP in terms of information, the processes entailed in its creation, equipment used, and its distribution both inside and outside of your organisation, including unique tangible assets. Knowing where IP exists in three dimensions will help make the definition as inclusive
as possible.

Consider reverse-engineering each IP asset to understand potential gaps in definition and scope. For example, if a perfume designer creates a new scent, such process of creation can be traced back to understand where sensitive information and ingredients are stored (or sourced from) as well as where they travel and how.

Assign IP asset ownership to specific functional roles within your organisation to ensure accountability. Train IP asset owners at least quarterly on their responsibilities. It is prudent to isolate IP asset ownership assignments among multiple functional leaders to avoid a total loss during a single attack.

Carefully curate IP asset movement and sharing both within and particularly outside of your organisation.

Foster frequent interaction among IP asset owners so that they could learn from each other with the objective of optimising IP asset management.

Streamlining IP protection
Focus on preventing IP loss. Once an IP asset is compromised / lost, some of the damage (operational, financial, and reputational) cannot be undone. It is crucial to make control processes consistent and continuing. Lack of incidents should not lead to complacency. Aligning protection levels with IP asset criticality levels (operational, financial, and reputational) as well as known risks and threats is the best and proven strategy.

Monitor behaviours of those with access to IP assets to identify any “red flags”. This can be done through collaboration between security, investigations, and HR functions. For example, an employee’s pattern of declining emotional health as well as occasional outbursts triggered by seemingly trivial issues should be viewed through the lens of his or her access to IP assets.

Consider frequently changing locations of IP assets on the network to help confuse internal and
external attackers. Be mindful to avoid patterns.

Codify, password-protect, and encrypt your IP asset data. For example, one IP asset owner should not know the codename for, or have access to, IP assets of another owner.

Implement exception-based monitoring of IP assets in all three dimensions. For example: consider what is not right about the current or past state of an IP asset?

Train all who touch IP assets frequently and in different formats (lecture, mobile, visual triggers, active questions, etc.) to foster vigilance. At a minimum, training should be delivered on a monthly basis.

Managing IP loss incidents
Your incident management plan should be actionable and practised at least quarterly. Remember: role-playing and visual workflows are better than a volume of dry text.

Establishing the extent of loss and its severity is key and should be done no later than in the first 30 minutes after an incident is first reported. This can only be achieved by building a robust IP asset inventory and classification system.

Understanding dimensions in which an IP asset has been compromised is critical as it will help optimise your remediation efforts.

Performing a root-cause analysis after each incident will help establish prudent mitigation measures to avoid recurring incidents.

Related Articles by Firm
Myanmar Opened its Broadcasting and TV Market
The Broadcasting Law 2015 opens commercial licenses for TV or radio for bidding under an independent supervisory authority. This offers wide opportunities to investors from broadcasting infrastructures to broadcasting services.
Clasis Law (India) Newsletter August 2015
Analysis of the revocation of a company's drug patent and other key court rulings and updates on corporate and commercial matters
The new CIETAC Arbitration Rules 2015
The New Rules adopt both best practices and the latest developments in international commercial arbitration and accommodate the increasing needs of the parties arbitrating at CIETAC.
Tanzania: Prospecting for and mining of radioactive minerals
New uranium mining projects have recently been announced in Tanzania. This briefing looks at the legislative framework surrounding radioactive minerals in Tanzania.
Related Articles
Understanding “Business Transfer”
When investing in a business in Vietnam, an investor may prefer to cherry-pick a specific part of the business rather than buying the entire company ...
China’s newly amended Anti-Unfair Competition Law changes the rules of the game
On November 4, 2017, the Standing Committee of the National People’s Congress (the NPC) of the People’s Republic of China (PRC) approved and published amendments to the Anti-Unfair Competition Law (AUCL) that substantially change the previous law enacted in 1993 (the ...
Deploying AI in the legal department
Artificial intelligence (AI) is changing the face of global legal practice and will continue to do so for the foreseeable future ...
Related Articles by Jurisdiction
Latest Articles
The new UAE Pledge Law
Promulgation of regulations that make registration available.
Exchange control laws of India: Compounding of contraventions
India has a complex exchange control regulatory mechanism that investors often find it difficult to comply with.
Corporate Social Responsibility
There is a growing realization among the corporates that business growth along with positive community/social impact is now an expected goal ...