Skip to content
Law Society of Scotland
Search
Find a Solicitor
Contact us
About us
Sign in
Search
Find a Solicitor
Contact us
About us
Sign in
  • For members

    • For members

    • CPD & Training

    • Membership and fees

    • Rules and guidance

    • Regulation and compliance

    • Journal

    • Business support

    • Career growth

    • Member benefits

    • Professional support

    • Lawscot Wellbeing

    • Lawscot Sustainability

  • News and events

    • News and events

    • Law Society news

    • Blogs & opinions

    • CPD & Training

    • Events

  • Qualifying and education

    • Qualifying and education

    • Qualifying as a Scottish solicitor

    • Career support and advice

    • Our work with schools

    • Lawscot Foundation

    • Funding your education

    • Social mobility

  • Research and policy

    • Research and policy

    • Research

    • Influencing the law and policy

    • Equality and diversity

    • Our international work

    • Legal Services Review

    • Meet the Policy team

  • For the public

    • For the public

    • What solicitors can do for you

    • Making a complaint

    • Client protection

    • Find a Solicitor

    • Frequently asked questions

    • Your Scottish solicitor

  • About us

    • About us

    • Contact us

    • Who we are

    • Our strategy, reports and plans

    • Help and advice

    • Our standards

    • Work with us

    • Our logo and branding

    • Equality and diversity

  1. Home
  2. For members
  3. Journal Archive
  4. Issues
  5. February 2008
  6. "She stole our data in her underwear!"

"She stole our data in her underwear!"

Authors warn of the constant need for vigilance against data theft in a world where the possible means are multiplying
18th February 2008 | Sharon D Nelson, John W Simek

She was your trusted personal assistant. She worked long hours, was good natured, competent, reliable – a dream come true. Every day for the last several years, she came to work with her iPod, playing her favourite music softly through speakers on her desk. You never gave a second thought to that iPod.

Until the day she left. Perhaps your IT department alerted you to an unusual number of sensitive files being accessed. Perhaps you found out that your clients were being seduced away by a competitor for whom your assistant is now working. No matter how you found out, you are now experiencing the ultimate executive nightmare – a data heist.

iPods have storage memory – video iPods even have hard drives. We all see iPods every day and we all think of music. But iPods aren’t just for music any more. As computer forensics experts, we have now seen multiple cases where the innocuous-seeming iPod was used to lift corporate data surreptitiously.

Mind you the average data thief will simply slip the iPod in her purse or briefcase. But in this wacky, edgy world, there actually is an iGroove panty for iPods. It may not have been on my Christmas list or yours, but it provides yet another avenue for your data to escape.

The lesson here is simple for managers responsible for the protection of business data: you must take seriously each and every technological development which may compromise your security. Your IT department should be monitoring for unusual downloading and copying. You may not want to allow USB devices to be connected to devices on your network. If you do allow such connections, you may want them monitored. Perhaps access to all sensitive data should be logged.

Data thieves are notoriously clever – and management is constantly limping to catch up with technological advances. If it isn’t the iPod carting off your data, it is the thumb drive, the smart phone, CDs and DVDs, web-based emails sent from local machines to avoid having them written to the server, etc etc.

In a business of any significant size, it is imperative to do security reviews, at least annually, to try to stay ahead of both technology and the cleverness of miscreants. This is certainly an area where an ounce of prevention is worth a pound of cure. Once your data have been pilfered, damage control and legal remedies are both expensive and limited in what they can achieve. The damage to your firm’s reputation may be difficult if not impossible to retrieve – and the flood of data breach laws and lawsuits has complicated an already maddening problem.

In a world where business secrets can depart via an employee’s lingerie, constant vigilance is mandatory.

Sharon D Nelson and John W Simek are the President and Vice President of Sensei Enterprises, Inc, a legal technology and computer forensics firm based in Fairfax, Virginia, USA

www.senseient.com

Share this article
Add To Favorites
https://lawware.co.uk/

In this issue

  • Members will decide
  • Take a firm approach
  • Pastures new
  • A breach of protocol
  • Creating real burdens in developments
  • Man with a mission
  • A timeless Act
  • Cost in a competitive market
  • Picking up the pieces
  • Summary justice on trial
  • Money laundering - the FAQs
  • Performance guide
  • Getting on the case
  • "She stole our data in her underwear!"
  • Trust and competence
  • So wrong, so long?
  • It's oh so quiet...
  • Extending adoption rights
  • Spirit of the law
  • Scottish Solicitors' Discipline Tribunal
  • Website reviews
  • Book reviews
  • Procuring procurement perfection - perhaps
  • Repairing the standard

Recent Issues

Dec 2023
Nov 2023
Oct 2023
Sept 2023
Search the archive

Additional

Law Society of Scotland
Atria One, 144 Morrison Street
Edinburgh
EH3 8EX
If you’re looking for a solicitor, visit FindaSolicitor.scot
T: +44(0) 131 226 7411
E: lawscot@lawscot.org.uk
About us
  • Contact us
  • Who we are
  • Strategy reports plans
  • Help and advice
  • Our standards
  • Work with us
Useful links
  • Find a Solicitor
  • Sign in
  • CPD & Training
  • Rules and guidance
  • Website terms and conditions
Law Society of Scotland | © 2025
Made by Gecko Agency Limited