Skip to content

Surety Podcast Series: Intellectual Property is a Corporate Asset that Needs Protecting

January 15, 2009

This is part one of a four part podcast series.

Podcast Presenters: Michael Elliott of Atrium Research & Consulting and Timothy Carroll, Partner at Loeb & Loeb LLP.

Data Security

As the electronic lab streamlines data integration and eliminates errors in research and retention, gains in discovery have increased by 20 percent. This has also spurred more of a team science mentality and collaboration, pushing organizations to view intellectual property as more of a corporate asset.

But what are the types of controls that need to be put in place to ensure data authenticity or proof of record integrity?

In this podcast series, learn about the benefits of an electronic lab environment and also across-the-board data-level security controls that must be put into place in order to protect the lifeblood of an organization.

  1. The Benefits of an Electronic Lab Environment: In this podcast, Elliott and Carroll discuss how companies going the way of eR&D are improving laboratory efficiencies, from the conception of experiments through information delivery.
    Register to download podcast segment. (3 MB)
  2. Data Level Security and Authenticity Controls a Trusted Witness in Electronic R&D Environments: A couple years ago, many companies tried extending their traditional records policies to the way in which they managed e-mail and electronic records, hoping for a one-size-fits-all approach. But is this inviting risk? Listen in, as Elliott and Carroll mull over the types of controls an organization can put in place to ensure data integrity for electronic documents.
    Register to download podcast segment. (4 MB)
  3. Protecting the Lifeblood of an Organization Through Across the Board Data-level Security Controls: In this podcast, Elliott and Carroll talk about the importance of protecting intellectual property, AKA the lifeblood of an organization and answer the question: Is the risk greater if a company has seven or eight repositories of electronic records and each one has their own separate set of security and authentication controls?
    Register to download podcast segment. (5 MB)

(Photo Credit: Jon McGovern)

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: