Know Your Limits
When an intrusion is detected, you must know to what lengths you can go to minimize the damage and also whether you can seize property. For example, let’s say that you have determined that an employee has installed hacking tools on your network and he has hacked into a business partner’s network. He then proceeded to steal passwords. Can you search his computer for evidence without a warrant? What about that UFD he carries on his keychain? Is that a work-related item or a personal item? These are the types of questions you’ll need to answer before you act.
Legal Organizational Rights and Limits
Employers can be either public or private. This distinction is important because government employers are bound by the Fourth Amendment, ...