The Insider Threat: How to Manage Employee Electronic Use & Safeguard Your Business

The greatest threat of intellectual property theft comes from your own employees. They can, and do, easily steal sensitive corporate data. A recent survey found that most ex-employees admitted to taking private corporate data with them, most acknowledged knowing it was wrong to do so, and most of them admitted to using that data in their next employment. Act now to establish human resources policies, monitor electronic use, and preserve a record of departing employees' electronic history. Protect your business from electronic thieves. 

What you will learn:

  • Implement an effective employee handbook with policies to protect your business.
  • Employee constitutional rights of privacy and what they mean to you.
  • Gain the right to monitor employee use of computers and electronic devices.
  • Positive employee counseling and effective discipline.
  • Computer investigations (forensics), and the power of knowing.
  • Recovering deleted electronic information.
  • Hiring and firing issues.

9:00 a.m. to 10:30 a.m.
  • Introduction and five reasons why you must know what employees are doing on your computers.
  • Your Electronic I.Q. assessment.
  • Fourth amendment right to privacy issues.
  • The scope of sensitive corporate data. Trade secrets. Customer contact information. Proprietary and confidential information. Employee private information, Business process documentation. Corporate financial data.
10:30 a.m. to 10:45 a.m.


10:45 a.m. to 12:15 p.m.

  • Electronic Mail, the Internet, and computers.
  • Union organizing campaigns and what you can do about them.
  • Employee handbooks. Preserve your right to monitor and investigate employee use of computers and other electronic devices.
  • Proactive forensics.
  • Employee counseling and discipline.
  • Termination of employment and what to add to your exit procedures.
12:15 p.m. to 1:00 p.m.


1:00 p.m. to 2:00 p.m.

  • What every employer should do: “Block and tackle.” Monitor computer activity. Proactive and reactive forensic investigations. Preserve evidence. Establish acceptable use policies.
  • Why your own IT staff is not the best choice for protecting your sensitive corporate data.
  • Your corporate plan of action.
  • Answers to the Electronic IQ assessment.


Tom Fredericks is an attorney with private and public sector experience specializing in employment law. He is Professor of Labor Law for Central Michigan University. He has presented seminars for the Michigan Chamber since 1987.

James B. Carter is president of Techmotives Consulting Group, Inc, a licensed professional investigation agency. Jim conducts formal investigations, and serves as a computer forensics expert witness in court. His corporate clients have included: Ford, IBM, and EDS.