No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Protecting Intellectual Property When It Needs to Be Shared

August 1, 2023
in Protection
0
Protecting Intellectual Property When It Needs to Be Shared



Protecting intellectual property (IP) when it is on the corporate network or in the cloud is difficult enough when a company has control of the network defenses, but when IP must be shared with a business partner, threats increase exponentially. While contractual obligations and insurance can reimburse a company with some monetary relief, putting the proverbial genie back in the bottle when corporate secrets become public or fall into the hands of competitors is impossible.

From a pure technology standpoint, CISOs can employ technologies that limit user access, such as switching to a zero trust network architecture (ZTNA) tool rather than the traditional virtual private network (VPN) remote access, or perhaps employ a role-based access control (RBAC) based on data classification, tokenization, or other security control. Additionally, limiting access by identity access management (IAM) is common.

Not all IP is the same, nor does all IP require the same security controls, notes Aaron Tantleff, a partner in the Technology Transactions, Cybersecurity, and Privacy practice groups at the law firm Foley & Lardner LLP.

Determining which controls are required and to what level depends on the value of the IP, both monetarily and to the operations of the company. It is difficult to generalize about IP protection because each organization has different types of IP that they protect differently, Tantleff notes. Organizations would not be implementing the same security controls necessarily through the vendor train because the controls depend on critical IP versus lesser value IP, he adds.

Sharing Safely

Traditional technologies — and even some emerging ZT-based approaches — do help limit the possibility of compromising IP, but do little to provide security when the IP must be shared with partners. Traditionally, companies shared just small parts of their IP, having various business partners do their work without having access to all of the IP for a product. For example, a business partner might build a single part for a larger project but not have enough knowledge to duplicate everything. In some cases, false “steps” are included in how something works, salting the database the company shared, Tantleff says.

Another way companies can modify their IP to make it less useful if obtained by someone not intended to see it is to obfuscate some details, such as project code names. One can rename certain functionality, such as renaming encoding, which is the core functionality of changing a video from one format to another.

While controlling the type and amount of data shared is one strategy, a company can limit vulnerabilities by holding onto all IP on their own system and allowing their direct partners to access what they need locally, adds Jennifer Urban, co-chair for Cybersecurity & Data Privacy within Foley & Lardner’s Innovative Technology sector.

A major vulnerability of corporate IP is third-party risk management (TPRM), where business partners share your IP with their own third parties. “It’s hard with third-party or fourth-party or fifth-party risk to really contain it because it’s not in your environment,” she says. One recommendation “is obviously not to send any IP to the extent that you can, and certainly prioritize vendors by the type of IP that they receive.”

Ideally, a company will keep IP on their protected network and only share the parts a partner needs via a secure connection to the corporate network. Limiting access by need and by specific data improves corporate defenses.

False Expectations

Peter Wakiyama, an intellectual property expert and partner at the law firm Troutman Pepper, says there are two important IP issues that many CISOs and corporate executives get wrong.

“CISOs may think that if there’s no harm, [such as] a data breach or loss, there’s no foul. That is not true. Simply failing to enact adequate protections may have legal consequences because a trade secret owner must consistently use reasonable efforts to keep trade secrets and other confidential information secure,” he says. “As new threats emerge, new protections must be continuously implemented to ensure that trade secret legal rights are not compromised.”

As to the second, Wakiyama notes, “Many CISOs and other IT professionals believe that if you pay for it to be created, you own it. Not true. Depending on the facts and circumstances, the vendor/developer may retain significant IP ownership rights to inventions (patents) and copyrights.

“For example,” he continues, “if a vendor is hired to design, build and implement a custom security program, unless the vendor agrees in writing to assign over all of its IP rights, it will retain invention rights and copyrights and may be free to use and share those rights with others.”

Andi Mann, founder of the management advisory firm Sageable, said protecting IP needs to be viewed as a human issue as much as a technological one. While organizations can do audits to track the use of IP, employing an array of monitoring and network visibility tools, it normally comes down to a people issue.

“You have to have controls in place,” he says. The technology component is important, but contractual agreements to limit what a third party can know and do with that knowledge is still a cornerstone.

“You’ve got to provide incentives. You’ve got to understand why people are accessing this kind of content in this data, like if one of my engineers goes and looks up our patent database or innovation plan. Why? Talk to me about why you need it. And you can restrict access to some of this data and some of this information,” Mann says.

Editorial Team

Editorial Team

Related Posts

Garmin Just Launched Two New Running Watches
Protection

Garmin Just Launched Two New Running Watches

May 12, 2026
10 Hacks Every Microsoft Outlook User Should Know
Protection

10 Hacks Every Microsoft Outlook User Should Know

May 12, 2026
This Mac App Will Demystify Your Tangle of Cables
Protection

This Mac App Will Demystify Your Tangle of Cables

May 12, 2026
This Amazon Fire TV Soundbar Is $150 Off Right Now
Protection

This Amazon Fire TV Soundbar Is $150 Off Right Now

May 12, 2026
How to Remove a Tick Without Touching It
Protection

How to Remove a Tick Without Touching It

May 12, 2026
My Favorite Amazon Deal of the Day: Google Pixel 9
Protection

My Favorite Amazon Deal of the Day: Google Pixel 9

May 11, 2026
Load More
Next Post
China’s overseas investment in metals and mining set to hit record

China’s overseas investment in metals and mining set to hit record

Popular News

  • US inflation hits 3.3% as Bitcoin jumps above $72K after CPI - 1

    US inflation hits 3.3% as Bitcoin jumps above $72K after CPI

    0 shares
    Share 0 Tweet 0
  • Bitmine takes BMNR to NYSE with $4 billion buyback expansion

    0 shares
    Share 0 Tweet 0
  • Ex-NYC Mayor Eric Adams denies profiting from NYC Token chaos

    0 shares
    Share 0 Tweet 0
  • devs under 26 lost 20% of work since 2022

    0 shares
    Share 0 Tweet 0
  • JPMorgan’s markets and investment banking revenue surge, but here’s why the stock is pulling back

    0 shares
    Share 0 Tweet 0

Latest News

Groundfloor launches second consumer credit portfolio

Groundfloor launches second consumer credit portfolio

May 12, 2026
0

US private markets platform Groundfloor has launched its second consumer credit portfolio, which will provide accredited investors with diversified exposure to...

Ether.fi price hits 8-month high amid 25% spike

Ethereum’s Clear Signing standard tackles blind transactions with ERC-7730

May 12, 2026
0

Ethereum’s new ERC‑7730 Clear Signing standard replaces hex gibberish in wallet prompts with human‑readable, auditable transaction summaries to slash phishing...

Stocks making the biggest moves midday: WEN, VSTS, CLSK, UAA

Stocks making the biggest moves midday: WEN, VSTS, CLSK, UAA

May 12, 2026
0

Check out the companies making the biggest moves midday: Vestis – The uniform and apparel maker surged more than 30%...

Career Services Specialist (Student Mentors, Events, and Admin)

Career Services Specialist (Student Mentors, Events, and Admin)

May 12, 2026
0

Career Services Specialist (Student Mentors, Events, and Admin)Requisition Number: S02338PPosition Category: StaffHours Per Week: 40Months Per Year:...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.