Boston, MA (PressExposure) December 22, 2010 -- Brainloop (http://www.brainloop.com), the leading supplier of software solutions for high-security management of confidential documents, today announced best practices that can help companies strategically protect their most confidential and sensitive documents from leaking outside the enterprise.
WikiLeaks headlines continue to underscore what happens when confidential documents are freely distributed by unauthorized parties. Unfortunate consequences can occur when companies lose control over confidential information and experience intentional or unintentional disclosure of the information. In some cases, even the possibility of information leakage can damage reputations and stock prices.
Without a document compliance strategy in place to manage document sharing, along with a platform to provide secure, efficient document collaboration, stakeholders will resort to emailing documents or employ an online collaboration tool that was never designed for security and traceability.
This puts information at risk, resulting in premature disclosure of companies strategic or financial information. Additionally, unsafe document sharing may result in companies failure to meet their contractual or regulatory obligations due to loss of information entrusted to them by a partner or other stakeholder.
Best Practices to Prevent Document Leaks
For companies to protect themselves they must establish a mechanism where business users can do their jobs without worrisome distraction, automatically applying security policies that will protect information that is being shared with externals. Best practices in document compliance policy mandate an enterprise-wide process to:
* Define security policies for types of documents
* Define roles and what privileges each group of users can have
* Provide a platform that automatically applies these policies
Providing security and compliance with end user demands for efficiency and productivity is a difficult balancing act for corporate IT, so security professionals goals should include:
* Empowering end users to perform all the collaborative tasks of their jobs within a secure environment
* Meeting user needs in a variety of business situations
* Ensuring that service level agreements support the companys contractual agreements and certification requirements
* Complying with audit, security and compliance standards, including
- Strong authentication
- Separation of content ownership and administration
- Information-centric security model with persistent document security and rights management
- Audit trail of all accesses to documents
Says Brainloop CEO Peter Weger, "Ironically, a document paradox exists in that the most confidential documents are often those that require the most sharing. The lifeblood of any business depends on trust and the sharing of information. However the integrity of a business is compromised if its most sensitive documents are stolen or tampered with. Should they become public, like in the case of WikiLeaks, then the business will lose the trust of all its constituents, damaging its reputation and causing the bottom line to suffer. Companies are at risk if they believe their documents are safe by default or by virtue of their not being leaked yet."