THE ORIGIN AND BACKGROUND OF PROPRIETARY INFORMATION
To understand where proprietary information fits in the larger picture, first envision a continuum of information.
Although much has changed with the advent of computers, the safeguarding of proprietary information still relies on the successful implementation of traditional physical security efforts, coupled with electronic security, and good employee training.
The result was increased protection for proprietary information in addition to overall improvements in executive protection.
Without revealing any proprietary information
, the professional team reports its findings to the commission relative to each of the standards.
It gives business managers and security professionals an overview of the new threats to proprietary information and suggests ways to guard against the loss of valuable corporate secrets.
Ironically, in the process of acquiring information technology, companies are putting their proprietary information at risk.
The group surveyed consisted of approximately 1,700 members of ASIS who bad indicated interest in safeguarding proprietary information or whose job responsibilities include this function.
The first question asked respondents if their company had experienced a theft or attempted theft of proprietary information or unauthorized use of the company's technology by domestic or foreign entities.