We already know that the May 2018 Regulation sets a new dimension in the protection of personal data and makes changes to the definition of sensitive data. This information plays a key role for companies processing them in space. Are there any additional confidential materials that could compromise the proper functioning of the organization and which are not covered by the General Data Protection Regulation - GDPR? Yes, and more importantly, when they are neglected they can cause the same (often irreversible) damage, loss of competitive advantage or loss of market position.
Company information under constant protection.
Next to personal data (of customers, staff, partners, etc.) and sensitive data there are the secrets of the enterprise. The secret of an enterprise is "(...) not disclosed to the public technical, technological, organizational information or other information of economic value for which the trader has taken the necessary operations to preserve their confidentiality". Consequently, such information as: status of assets and liabilities; revenue, profit and sales achieved in a given period; patents and recipes; policies and contracts; financial commitments; terms of cooperation with contractors; business / financial / strategic plans; costs or losses incurred - all of these can be considered as business secrets. The above-mentioned data to be classified as confidential should be backed up by confidentiality and value-for-business activities. On the other hand, sharing of data with people inside / outside the organization should be the subject to constant monitoring, paying special attention to the competition.
Ways to protect business secrets.
Information that is confidential, most often provide business liquidity. How important they are for the company shows the incident from September 2001 - the attack launched on the World Trade Center. About 60% of the companies that were stationed in the attacked objects suddenly lost not only valuable employees, but also a large amount of data stored on computer disks or cumulative files. It would seem that, thanks to the powerful compensation and commitment of the management boards, they would quickly return to the market, but it was different - companies went bankrupt. As you can see, the cumulative data was fundamental, and their destruction made it impossible to rebuild businesses.
In order to breach information it is enough that someone with bad intentions will use the visible and publicly available documents, copy files placed on electronic media or break into the company server. Criminals are aware that sensitive, commercial, technological or competitive data is not hidden in a safe room occupied by professional guards. It is usually protected by a key-drawer or a secured computer system. The main purpose of creating this system is to implement a security strategy by controlling, monitoring your databases, particularly vulnerable to intentional or unintentional interception. In addition, contract protection is a very common practice. As part of this, the confidentiality clause is signed in all areas where the company shares information (both in contacts with employees, contractors, and potential business partners). Whenever someone discloses a secret, despite the signed clause, it is necessary to show him his dishonest act as soon as possible. Furthermore, the injured organization may demand from perpetrator the removal of the adverse effect and the reparation of the damage done; creating a declaration with the imposition of form and content; giving monetary amount for a social purpose.
Information security as a fair investment.
Considering the increasing number of cybercriminals and criminals attacks, maintaining security seems to be complicated and requires constant control. Indeed, security is a very complex issue, closely linked to the skillful management, processing different types of information, education of current and future employees and the selection of solutions that are tailored to the needs of the organization. In order to ensure that the company is properly prepared for emergencies, it is advisable not only to form internal security departments but primarily to seek support from outside security professionals.