Many employees succumb to the temptation of reading one version of their company’s code of ethics and practicing another. And we couldn’t blame it entirely on them. While most of these IP-protection safeguards are copy pasted from dubious sources, little is done both from the employer’s and the employee’s end to ensure these guidelines meet acceptable ethical standards or are even understood to begin with. The to-do list seldom recommends factors that the company considers critical. To make the matters worse, rather than being proactive about the issue, organizations tend to rely on the punishments for deviant behaviors and the employee is left ruminating— “Having known the competitive value of company secrets and following consequences of a leak, would I still go ahead and take the chance?”
For most of us, the answer would be a sure short —No! Provided you have a hidden streak of masochism and you wish to get perpetually blacklisted, pay unaffordable settlements, or worse, go behind bars. For a few others, however, the pinch of vengeance supersedes their common sense. Our courts are brimming with cases that show vengeful doing on part of workers to draw blood from their pay-masters. From copying information to thumb drives, anomalous email correspondences, untimely accessing company data, provoking peers to join in the act, staying in touch with rival companies, showing a tendency to steal classified documents to causing damage to existing information flow, they have crossed the line far more than they should ever have.
A former Apple employee, Xiaolang Zhang, was charged with stealing the self-driving car circuit board plan. He had planned to work for a Chinese self-driving car start-up and was running away with the secrets. Elon Musk, the CEO of Tesla, filed a lawsuit against the former process technician, Martin Tripp. The former employee had hacked the company’s trade secrets and information and went ahead to transfer it to third parties. And all this, because he was reassigned to a different job.
And it doesn’t end there. The symptoms are indicative of an upcoming resignation with a possible information cross-over to the unadvised rival territory. It’s easy to lose sight of what should be done let alone how. If that is the case, we suggest you take a look at our easy-to-apply guide on preemptive measures for reducing data thefts:
The entire exercise is a practice; it doesn’t end at incorporating stringent sounding measures. The human resource practitioners should intervene in cases when they see trouble coming. Their plan should ideally comprise of the following:
With a clear stand on such issues, both the employer and employees could have an amicable, no matter the quality of heretofore, association.
This website uses cookies to enhance website functionalities and improve your online experience. By browsing this website, you agree to the use of cookies as outlined in our privacy policy.