Preview

Confidential Information

Satisfactory Essays
Open Document
Open Document
282 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Confidential Information
Confidential Information
IP of GP
Lena M Rayls
HRMT645-1101A-01 Operational Human Resource Management

Employees of your company will be privy to inside information not readily available to the public. Therefore, to protect this important information, a confidential information policy has been put in place. Our organization 's information classification policy will addresses two types of confidential information: competitive-advantage (trade secret) and personal information. Our employees shall be advised that all of the company’s financial information, business plans, marketing strategies, manufacturing routines, customers, and suppliers are considered trade secret information and property of the company. Violations of this policy are also known as espionage. There are laws in place to protect against the disclosure of this information or espionage. The Economic Espionage Act Of 1996 (EEA) is an act that makes theft or misappropriation of trade secrets a federal crime (LegalMatch, 2010). This act makes the act of stealing, selling, buying, or even possessing of a trade secret without authorization punishable by law.
The Personal Information section includes employee information and customer information. Customer information is entrusted to our care and we take this trust very seriously. Any violation of this policy will reflect poorly on our company’s ability to run a credible business. Employees will refrain from discussing company business with anyone outside the company in order to avoid an accidental violation of this policy. Internal consequences for violation of this policy can include immediate termination. On top of Internal Consequences, violators of this policy may also receive external consequences such as a fine, jail time or both." References:
LegalMatch. (2010). What Is the Economic Espionage Act of 1996? Retrieved January 23, 2011, from LegalMatch Web site: http://www.legalmatch.com/law-library/article/economic-espionage-act-of-1996.html



References: LegalMatch. (2010). What Is the Economic Espionage Act of 1996? Retrieved January 23, 2011, from LegalMatch Web site: http://www.legalmatch.com/law-library/article/economic-espionage-act-of-1996.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    was introduced in the third quarter of fiscal 2011. These spas for children offer hair and…

    • 478 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bis 220 Week 1

    • 470 Words
    • 2 Pages

    References: Do-Not-Call Implementation Act Law & Legal Definition. (n.d.). In Legal Definitions Legal Terms Dictionary. Retrieved February 12, 2013, from http://definitions.uslegal.com/d/do-not-call-implementation-act/…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Data Protection- All information should be protected by staff and professions to protect the clients. Also all private and confidential information you share with your employer is protected so they do not share it without your permission.…

    • 973 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    9-11 Commission, Homeland Security, and Intelligence Reform. (n.d.). Retrieved from U.S.Senate Comitee on Homeland Security and Governmental Affairs: http://www.hsgac.senate.gov/issues/9-11-commission…

    • 1148 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Goffman, A. (2009). On the run: Wanted men in a Philadelphia Ghetto. American Sociological Association, 74(3), 339-357.…

    • 967 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    References: Indiana University. (2012). Knowledge Base. What is the No Electronic Theft Act? Retrieved from: http://kb.iu.edu/data/aliv.html.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 P1

    • 1089 Words
    • 5 Pages

    Confidential information; all the confidential information must be kept in the office, which is locked from young people, it must be out of site from any young people looking…

    • 1089 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Breach of Confidentiality

    • 548 Words
    • 3 Pages

    Advanced Healthcare has strong emphasis on patient satisfaction, convenience and patient privacy. Advanced Healthcare has an EMR and LIS. Advanced Healthcare is a mid-size clinic with an Urgent Care Clinic. The staff in smaller clinics often has multiple functions. The employee involved was a lab tech who generally worked nights and weekends to support Urgent Care. She had access to Electronic Medical Record to be able to search for lab orders. During implementation phase: the lab orders are not all entered in EMR if the provider not present and the learning curve was that the MD compliance with entering an order.…

    • 548 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The hardest thing to deal with being inside a company, is when you lose one of your employees to one of your competitors. You worry if that employee is going to give inside information that could cause harm to your company. Companies should play fairly in the competition game and not spy on one another, communicate with one another, and not causing harm to others. The information that is given out could hurt the other company and you need to understand what is considered acceptable and unacceptable information ethically.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Robinson, Jeffrey. "THE BLACK MARKET PESO EXCHANGE -." The Black Market Peso Exchange. 14 Apr. 2012. WordPress. 16 Apr. 2014 <http://www.jeffreyrobinson.com/blog/?p=62>.…

    • 1662 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Zephyr Pharmatec Ltd

    • 1518 Words
    • 7 Pages

    2. “Confidential Information” means information of a confidential nature (including trade secrets and information of commercial value) known to the Company and concerning the Company and the Products and communicated to the Distributor by the Company;…

    • 1518 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Corporate Espionage

    • 438 Words
    • 2 Pages

    Because products tend to become obsolete much faster today than they did thirty or forty years ago, research and development are among the most important activities in modern business. However, it is an expensive activity. Some companies try to save money by paying people to conduct corporate espionage, that is, to spy on competitors' research and development operations. Is such espionage ever morally justifiable?…

    • 438 Words
    • 2 Pages
    Good Essays
  • Better Essays

    I'm not talking about sabotage here; I'll address that later. By "espionage," I mean attempts to gather information through underhanded means for reasons other than identity fraud and other directly, criminally profitable purposes.…

    • 961 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Economic Offences

    • 3842 Words
    • 16 Pages

    Economic offences form a separate category of crimes under Criminal offences. These are often confused with White/Blue Collar crimes. Generally people belonging to upper economic classes are found involved in such crimes with the help of some unscrupulous and corrupt Government functionaries and advanced technology. Not only individuals get victimized with pecuniary loss in Economic Offences but such offences often, damage the national economy also and have security implications. The offences of Smuggling of Narcotic substances, Counterfeiting of currency and valuable securities, Financial Scams, Frauds, Money Laundering and Hawala transactions etc. evoke serious concern about their impact on the National Security.…

    • 3842 Words
    • 16 Pages
    Better Essays

Related Topics