How to prepare for a WHS audit: a practical guide for Australian workplaces
From reviewing maintenance schedules for heavy plant and local exhaust ventilation systems to verifying worker...
“They’re going to work for [insert competitor name], we need your help,” the client will tell us. The pandemic has turbocharged this problem, as lax operational standards have allowed employees who are working from home to have huge quantities of highly valuable data at their fingertips. We are morally repulsed by the Russian hackers who took huge volumes of personal data from Medibank Private but there seems to be far less public interest when Sharon from marketing finishes up on Friday with one gigabyte of customer data saved on her iPhone with the intention of using it for her new job.
As a disclaimer, I am not an IT security expert. However, I am a legal expert in trying to clean up the mess that misuse of confidential information by employees causes an organisation. I appreciate that the law is not the solution but one of many possible solutions. By the time the problem has landed on my desk there is a burning desire to act with urgency. I want to share with you my insights on where I perceive that these problems often originate.
Most Australian businesses have recognised the obvious business need for robust IT security protections. However, most of the efforts are focused on stopping the bad guys from getting in, whether from hacking, to phishing, spear-phishing or man-in-the-middle access attacks. Talking as a person whose personal data has been sold on the dark web due to a medical service provider’s IT failing, there is an absolute need for organisations to take IT security seriously. However, less attention is often placed on how various sections of the workforce are able to manage, copy and transform business data. It is the problems posed by the people within, not the outside, that I have to wrestle with.
‘Playing with’ the organisation’s data is invariably part of a lot of roles within each business. This has driven huge benefits for businesses by using data analytics to identify areas for growth and market gaps. This means that there are often numerous classes of workers within a business who may, if ever tempted, be able to access and extract vast datasets that if they ever fell into the hands of a competitor may be welcomed with open arms. The benefits of granting access to an organisation’s data can also be a latent defect that only manifests much later.
Without presenting an exhaustive list of methods for data breaches, I have pointed out what I see are the common causes for the weakening of an organisation’s data protection posture:
I have set the stage above for four common instances of weakened business security. Each of them occurs in good faith and arises with a positive operational outcome in mind. However, these small tears in security are premised on the false assumption that the positive, happy and productive worker will always be that way. Sadly, good people can also do bad things. They just need to be placed in the right environment and have a particular mindset generated to trigger their actions.
While there are the garden-variety of data thieves:
However, a lot of the more common data thieves are people who have had access to the data for months and months – it’s saved onto their phones, it’s on USB keys that ostensibly were used for work purposes or even on their own personal devices. When those types of people tender their resignations, the ability to get a comprehensive account for all the data they hold can often be akin to trying to find every piece of the shell of Humpty Dumpty. It can require complex forensic IT examinations and even then, there are often roadblocks to getting a comprehensive picture of non-business devices which have been involved in the accessing or using a business’s critical data.
As a lawyer I should be selling the virtues of the law and how it can save the day. In many instances it can pay a very important part in shutting down the distribution of critical business data by ex-employees; however, it requires invoking complex legal processes and can often be stalled by crafty opponents.
Given the extensive number of well-publicised data breaches, the impact of data theft is within the public conscience. There is still little legislative progress in helping individuals (let alone businesses) who are impacted by data theft. Most legal actions against ex-employees are underpinned by the common law, equitable principles and civil remedies. Whilst I very much enjoy playing in this space, the civil court systems are invariably geared towards a compromised outcome: a settlement. I’m not sure how many times a car thief negotiates a settlement with the car owner once they’ve been identified, however under the current vacuous legislative regime this is very much the end point many organisations face. Many are prepared to stay the course to recover what has been taken and to send a message. Others waver if the initial round of forensic IT examinations don’t bring a smoking gun. As such, prevention of critical data loss is far better than a reactive stance once the breach has occurred.
To minimise the risks of ex-employees walking out the door with your data, I have set out below a non-exhaustive list:
If you discover a critical breach, we’re here to help but you need to act fast. Given the speed by which large volumes of data can be moved between devices and cloud servers, it is important that any breach is addressed swiftly.
Matthew Robinson is a Partner and award-winning Solicitor with Citation Legal. Based in our Sydney office, he has been advising clients on industrial relations and employment matters for almost twenty-five years. He is an accredited specialist in employment and industrial law. An experienced litigator, he has special expertise in assisting clients operating in the manufacturing sector.