Your workplace may use computers to manage day-to-day operations. Organizations control access to computers through computer accounts and passwords. If an unauthorized person obtains the account name and/or password, the security process can fail.
Other types of information or intellectual property, such as copyrights, trademarks, patents, industrial design rights, and trade secrets, may be stored on paper in locked offices or other secure areas. If unauthorized people gain access to those areas by circumventing security protocols, the information may be compromised.
Today, portable electronic devices (e.g., laptop computers, thumb drives, “smart” phones, etc.) have large storage capacity that allows for the storage of thousands of files, which may include sensitive information. For example, a handheld device may contain names, contact lists, company proprietary information, and even passwords. Gaining unauthorized access to these types of devices can severely impact an organization’s security.