In a recent survey of 500 information technology and data security workers, 40 percent said they could easily use their knowledge of encryption keys, shared passwords, weak controls and loopholes in data security programs to make off with information, or hold their organization’s data hostage. And 31 percent said that, even if they no longer worked for the company, with their knowledge of the systems they could access encryption keys and authorization codes and hack in remotely to snoop, secretly alter files or shut down the data system.
Ontario's Labour Arbitration Board recently held that an employer did not overreact when it terminated an IT employee for cause after he used an employer computer to download, store and share thousands of copyrighted works including movies, TV shows, music tracks, games and pornographic material, totalling over half a terabyte of data. The board found that the employee violated the employer’s trust in him and acted in flagrant disregard for the employer’s computer information access policy over many years.
Established in 1995, First Reference provides organizations with practical and authoritative resources to help ensure compliance with constantly changing Canadian legislation and best practice