Taking steps to protect intellectual property (IP) from loss or theft is critical, and when an IP incident occurs a quick and thoughtful response is crucial.
Over the past few years Kroll has seen varied cases of IP theft, from engineers of a chemical company walking out of a facility unhindered with critical schematics of a reactor on a USB device , to customers picking up trade secrets on a facility tour and passing it on to their contacts. We often find that individuals involved in compromising a company’s IP are a combination of current or former employees, competitors, trusted customers, distributors or vendors, therefore the security equation must encompass issues of operational security and cyber security. Both impact one another and should not be looked at in isolation.
Often the protection of IP is left to a series of uncoordinated processes that do not bind together sufficiently and leave gaps which can be exploited. Kroll’s approach to instituting an Intellectual Property Protection System comprises two clear phases: firstly to work with the client to identify its IP and security weakness and secondly to put in place realistic measures and a management structure to alleviate those weaknesses.