Email: iumanskiy@kroll.com
Website: www.kroll.com

v14i7_Kroll

Managing and protecting intellectual property (IP) can be a complex undertaking. Often, IP is viewed too narrowly — in many cases only as something intangible. Yet experience shows that IP is quite multi-faceted and practitioners have to think in three dimensions — mental, physical and digital — to fully grasp IP’s potential vulnerabilities. Our mobile phones are a good example. Their manufacturers certainly have people who know about highly sensitive attributes of the product (mental); proprietary information about the phone’s design and manufacturing most likely exists in printed form (physical); and nearly all of the aforementioned information about the device is stored on the network and personal computers within the organisation (digital). Protection of IP can be consistent only when sufficient controls are applied in all three dimensions.

Streamlining IP management
Think of IP in terms of information, the processes entailed in its creation, equipment used, and its distribution both inside and outside of your organisation, including unique tangible assets. Knowing where IP exists in three dimensions will help make the definition as inclusive
as possible.

Consider reverse-engineering each IP asset to understand potential gaps in definition and scope. For example, if a perfume designer creates a new scent, such process of creation can be traced back to understand where sensitive information and ingredients are stored (or sourced from) as well as where they travel and how.

Assign IP asset ownership to specific functional roles within your organisation to ensure accountability. Train IP asset owners at least quarterly on their responsibilities. It is prudent to isolate IP asset ownership assignments among multiple functional leaders to avoid a total loss during a single attack.

Carefully curate IP asset movement and sharing both within and particularly outside of your organisation.

Foster frequent interaction among IP asset owners so that they could learn from each other with the objective of optimising IP asset management.

Streamlining IP protection
Focus on preventing IP loss. Once an IP asset is compromised / lost, some of the damage (operational, financial, and reputational) cannot be undone. It is crucial to make control processes consistent and continuing. Lack of incidents should not lead to complacency. Aligning protection levels with IP asset criticality levels (operational, financial, and reputational) as well as known risks and threats is the best and proven strategy.

Monitor behaviours of those with access to IP assets to identify any “red flags”. This can be done through collaboration between security, investigations, and HR functions. For example, an employee’s pattern of declining emotional health as well as occasional outbursts triggered by seemingly trivial issues should be viewed through the lens of his or her access to IP assets.

Consider frequently changing locations of IP assets on the network to help confuse internal and
external attackers. Be mindful to avoid patterns.

Codify, password-protect, and encrypt your IP asset data. For example, one IP asset owner should not know the codename for, or have access to, IP assets of another owner.

Implement exception-based monitoring of IP assets in all three dimensions. For example: consider what is not right about the current or past state of an IP asset?

Train all who touch IP assets frequently and in different formats (lecture, mobile, visual triggers, active questions, etc.) to foster vigilance. At a minimum, training should be delivered on a monthly basis.

Managing IP loss incidents
Your incident management plan should be actionable and practised at least quarterly. Remember: role-playing and visual workflows are better than a volume of dry text.

Establishing the extent of loss and its severity is key and should be done no later than in the first 30 minutes after an incident is first reported. This can only be achieved by building a robust IP asset inventory and classification system.

Understanding dimensions in which an IP asset has been compromised is critical as it will help optimise your remediation efforts.

Performing a root-cause analysis after each incident will help establish prudent mitigation measures to avoid recurring incidents.

[sharethis]
Related Articles by Firm
Statutory Registration of Standard Terms and Conditions in Tanzania
All companies doing business in Tanzania should know the salient points of the Standard Form (Consumer Contracts) Regulations 2014 which takes effect on 29 December 2015.
Tanzania Bill Establishing the Petroleum Act 2015
Tanzania's proposed Petroleum Act 2015 introduces key changes to the Petroleum Exploration and Production Act 1980 and the Petroleum Act 2008.
Clasis Law (India) Newsletter August 2015
Analysis of the revocation of a company's drug patent and other key court rulings and updates on corporate and commercial matters
The new CIETAC Arbitration Rules 2015
The New Rules adopt both best practices and the latest developments in international commercial arbitration and accommodate the increasing needs of the parties arbitrating at CIETAC.
Tanzania: Prospecting for and mining of radioactive minerals
New uranium mining projects have recently been announced in Tanzania. This briefing looks at the legislative framework surrounding radioactive minerals in Tanzania.
Related Articles
Anti-Trust & Competition: China - Anti-monopoly enforcement in China’s healthcare industry
The healthcare industry has gradually become one of the key focal points of the anti-monopoly law enforcement in China ...
Anti-Trust & Competition: Philippines - Towards robust yet balanced competition in the Philippines
The state of Philippine competition regulation has been slowly taking shape barely over two years after the passage of the Philippine Competition Act (RA 10667) ...
Anti-Trust & Competition: Asia’s evolving competition landscape
After a period of rapid adoption of competition laws in Asia, only Bhutan and North Korea are compliance safe spaces ...
Related Articles by Jurisdiction
Latest Articles
ZICO celebrates 30 years with charitable donation
Yokuk provides therapy and welfare services as well as educational support for children and adults suffering from various disabilities ...
Crime vs. Ethics: Changing corporate culture to reduce modern slavery
The second of four reports from Kroll and Liberty Asia on how to mitigate any hidden compliance and reputational risks relating to human trafficking issues …
The Assistant Registrar’s Role in the Judicial Hierarchy
The decision in Peter Low LLC provides the latest judicial pronouncement on the role and position of an Assistant Registrar in the judicial hierarchy ...