||For ODM & OBM manufacturers, since they have to invest a good amount of money in Product Research & Development (R&D), if the product idea and graph were leaked to their competitors, the loss will be disastrous.
||By and large, buyers will provide OEM manufacturers product specifications and designs for mock-up and production. And the OEM manufacturers were expected to use the given information discreetly and ethically. Certain buyers even impose regulations and implement IT security system to their manufacturers, in order to make sure that any information is being used properly and securely.
|Challenges come from
||Internal authorized users. Since they have to access sensitive information throughout the daily operations, they can easily copy the information to external sources, such as USB storage devices and e-mail. For management, these users can still access the information, but they should not carry information out of the company by all means if they are not authorized.
|Examples of internal threats
||Engineers, designers, salespersons, and people who have rights to read those sensitive documents.
|Examples of sensitive documents
||Product Specifications, Design Drawings, ISO Documents
Product Specifications, Design Drawings, ISO Documents
- Loss of company valuable Intellectual Properties
- Jeopardizing company competitive advantage
- Loss of money
- Damage to company goodwill
- Damage to company’sgoodwill
- Losing customers, that is to say contracts!