On February 1st, the U.S. Department of Justice (DOJ) announced the sentencing of a trade secrets thief to 30 months for stealing scientific data from a U.S. medical research center to benefit herself and Chinese-State institutions.
NOTE: There is a co-conspirator that has not, as yet, been sentenced.)
The case made against the targets relied heavily on digital evidence of their transferring trade secrets from their work computers to their personal computers through email—similar to what I wrote about in my previous post.
WORKPLACE CYBER SECURTY
Yesterday, BusinessWire.com (a Berkshire Hathaway Company) published an article regarding a cyber security firm (DTEX) based in San Jose, California, that has reportedly enhanced its workforce cyber intelligence platform.
BEHAVIOR ACTIVITY MONITORING
One element of DTEX software (that is most intriguing to me) is the claim that the system can collect data that gives a company indicators of malicious intent in a workforce through what they call, “Behavior Activity Monitoring.”
There’s a short DTEX video about midway down the page of this link that gives a snapshot of its platform. I recommend you take a few minutes to watch it.
DTEX appears to recognize the dangers of not only protecting a company’s IP from outside bad actors, but also recognizes the need to minimize risk of IP theft by insiders through a comprehensive and innovative behavior detection platform.
It is useful for IP industry investigation and protection professionals (regardless of speciality) to become more acquainted with workplace IP protection software.
NOTE: IPPI Blog.com has no affiliation with DTEX, nor did DTEX contact IPPPIBlog.com to write this post, nor does IPPIBlog.com have any financial interest in the company.
Disclaimer: IPPIBlog.com is offered as a service to the professional IP community. While every effort has been made to check information in this blog, we provide no guarantees or warranties, express or implied, with regard to content provided in IPPIBlog.com. We disclaim any and all liability and responsibility for the qualification or accuracy of representations made by the contributors or for any disputes that may arise. It is the responsibility of the readers to independently investigate and verify the credentials of such person and the accuracy and validity of the information provided by them. This blog is provided for general information purposes only and is not intended to provide legal or other professional advice.
THANK YOU RON
Yes this has a similar flavor
I would expect these cases serve as a wake up call to the research community
and other entities that create and possess valuable and expensive research
Special Agent FBI-Retired
Pingback: Chinese State-Sponsored Espionage (a.k.a. IP Theft) Survey – IP PI BLOG
Pingback: Chinese State-Sponsored Espionage (a.k.a. IP Theft) Survey – IP PROBE – Blog