5/14 (Tue.) 16:30 - 17:30 7F 702

Starting from Information Security, moving towards Management of Trade Secret and Preserved Evidence

The scope of "information security" is not equal to the scope of "trade secret". Thus, it is essential to identify trade secret so as to establish the corresponding control measure. In addition, If an organization faces a trade secret suit, digital data, with its characteristics of being easily tampered and spread, it is necessary to take measures to assist in identifying and proving the source of data in order to clarify responsibilities. In summary, existing information security practices are probably unable to respond to trade secret risks. How to boost the integrated management of information security and trade secret, and future effectiveness of evidence, are the important issues in digital era.

Tsou, Tsung-Hsuan
SPEAKER
Deputy Director of Innovation & Intellectual Property Center in Science & Technology Law Institute
Institute for Information Industry

Shih, Ping-An
CO-AUTHOR
Shih, Ping-An
Section Manager of Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry
Institute for Information Industry
Lo, Yu-Ju
CO-AUTHOR
Lo, Yu-Ju
Section Manager of Innovation & Intellectual Property Center in Science & Technology Law Institute
Institute for Information Industry
Fang, Wen-Chen
CO-AUTHOR
Fang, Wen-Chen
Project Manager of Innovation & Intellectual Property Center in Science & Technology Law Institute
Institute for Information Industry
Lin, Chao-Ju
CO-AUTHOR
Lin, Chao-Ju
Project Manager of Innovation & Intellectual Property Center in Science & Technology Law Institute, Institute for Information Industry
Institute for Information Industry

TOPIC / TRACK
Cyber Briefing

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 702

LEVEL
General General sessions explore new cybersecurity knowledge and non-technical topics, ideal for those with limited or no prior cybersecurity knowledge.

SESSION TYPE
Deep Dive Session

LANGUAGE
Chinese

SUBTOPIC
Governance Risk & Compliance
Data Leak
Enterprise Security