The return of data theft and covenant breach in the recruitment industry - May / June 2010

Page created by Harvey Thomas
 
CONTINUE READING
The return of data theft and covenant breach in the recruitment industry - May / June 2010
May / June 2010

  The return of data theft
  and covenant breach
  in the recruitment industry
The return of data theft and covenant breach in the recruitment industry - May / June 2010
contents                                                         INTRODUCTION

    Introduction                                                2    As the recruitment industry starts to recover, so the likelihood of wrong-
                                                                     doing by consultants who choose to hop from agency to agency or set up
    Trends                                                      2    in competition on their own grows. As lawyers specialising in this area, we
                                                                     forecast a sharp increase in 2010 in incidents of data theft and breaches of
    What information is taken?                                  3    covenant by consultants as the industry begins to bounce back from 18 months
                                                                     of recession.
    Who are the perpetrators?                                   3
                                                                     15 years’ experience advising and litigating in this industry has taught us that
    How is the information taken?                               4    the most valuable assets of a recruitment company are its relationships with
                                                                     its clients and candidates and the corresponding records stored on a database.
    The telltale signs                                          5    While they are employed, consultants work tirelessly to develop, maintain and
                                                                     record these relationships for the benefit of the company. However, the same
    Prevention is better than cure                              6    consultants often appear confused as to who owns that relationship and the
                                                                     data when they leave to join a competitor or set up on their own.
    What information can you protect?                           6
                                                                     This report seeks to build on and refine statistics compiled by us in this area
    Protecting relationships                                    7    from over 130 data theft and covenant breach cases that we have prosecuted
                                                                     for recruitment industry clients in the past three years. The primary purpose
    Taking Action                                               8    of this report is to provide those involved in the recruitment sector with an
                                                                     understanding of the key areas of risk, based upon our experience of dealing
    How do you prevent data theft and enforce your covenants?   9    with problems of this type, so that you can take action to protect your business
                                                                     and mitigate the financial exposure caused by such conduct.
    Conclusion                                                  10
                                                                                                                                                            Since the third quarter of
                                                                                                                                                            2009, we have seen a rapid
                                                                     Trends
                                                                                                                                                            increase in the number of
                                                                                                                                                            data theft cases.
                                                                     From an analysis of our caseload during this period, the recruitment industry
                                                                     experienced a straight line increase in data theft and breach of covenant from
                                                                     the beginning of 2007 to the third quarter in 2008. However, as the economy
                                                                     went into meltdown in quarter four, 2008 and the full effect of the credit
                                                                     crunch was felt throughout the recruitment industry during quarters one to
                                                                     three in 2009, the number of data theft cases fell to its lowest level since the
                                                                     late 1990s. This may in part reflect constraints in our clients’ litigation budgets.
                                                                     However feedback from client business units re-enforces our conclusion that
                                                                     a downward trend in the business cycle led to lower staff turnover and fewer
                                                                     instances of unscrupulous behaviour by rogue consultants. Essentially, during
                                                                     the recession, recruitment crooks went into hibernation and this is reflected
                                                                     in the nature of the work that we have advised upon during this period.

                                                                     Since the third quarter of 2009, we have seen a rapid increase in the number
                                                                     of data theft cases as market pressures have eased and businesses look to
                                                                     fill short and longer term positions. This is an alarming rise but not entirely
                                                                     unpredictable. With this, the need for businesses to take swift action to
                                                                     enforce their restrictive covenants has increased. This is a trend which the
                                                                     industry should ignore at its peril.

1                                                                                                                                                                                        2
What information is taken?                                                               How is the information taken?

                                     Amongst the cases that we have prosecuted in the past three years, by far                The most common method for employees to transfer stolen data was via email,
                                     the most common category of stolen, confidential data has been client and                accounting for 53% of cases. The second most common method involved
                                     applicant contact details: 86% of cases. The next largest category of stolen data        employees printing out lists of contacts and other documents. The use of
                                     (7% of uncovered information theft) was company financial information                    USB memory sticks, iPods, CDs or DVDs to download and store stolen
                                     (internal accounts, price structures, business plans, projections and forecasts).        information accounted for 15% of cases. Given the low cost, ease of use
                                     In 5% of cases, employees stole contractual documentation and confidential               and ease of concealment (given the ever reducing size of such devices), this
                                     information relating purely to the employer’s relationship with its clients. In          figure has risen significantly. Three years ago it accounted for less than 5%
                                     the remaining 2% employees took web design plans and other intellectual                  of theft.
                                     property to assist in creating a new start-up business.
                                                                                                                              As technology continues to advance, the way an organisation protects these
                                                                                                                              assets needs to be continually revised and updated. The advent of social
                                                                                                                              networking sites such as LinkedIn will make businesses more efficient and
                                     Who are the perpetrators?                                                                profitable. But these sites are also a goldmine of opportunity for the data thief.
                                                                                                                              Between 2007 and 2010 we have seen cases involving theft of information
                                     On a gender basis, between 2007 and 2010, a staggering 70% of data theft 14              via social networking sites increase by 125%.
                                     cases in the recruitment sector were orchestrated and carried out6 by males,                                  8
                                                                                        77                                           7
                                     operating alone or in groups. Only 21%3 percent of data theft was committed         15
                                     by mixed groups. Lone women or groups of women committing data17 theft
                                                                                               53
                                     (9%) are rare in our experience. 67% of thefts were carried  out by individuals
                                                                       3
                                     acting alone.

                                                                                                                                                                                          %
                                                                                                                                                                                          17
                                                                                                                                                                                                                   We have seen cases involv-

                                                                                                                                                                                       py
    By far the most common                                                                                                                                                                                         ing theft of information

                                                                                                                                                                                     Co
    category of confidential data                                                                                                                                                                                  via social networking sites

                                                                                                                                                                                  rd
    that was stolen was client                                                                                                                                                                                     increase by 125% between

                                                                                                                                                                              Ha
    and applicant contact details.                                                                                                                                                                                 2007 and 2010.

                                                                                                                                     Email 53%                                         USB memory sticks,
                                                                                                                                                                                       DVD, CD, etc 15%
                                                                                                                                                                             So
                                                                                                                                                                               cia
                                                                                                                                                                                  lN
                                                                                                                                                                                     et
                                                                                                                                                                                       wo
                                                                                                                                                                                          r   kin
                                                                                                                                                                                                 g
                                                                                                                                                                                                     7%

                                                                                                                                                                            Oth
                                                                                                                                                                               er
                                                                                                                                                                                  8%
3                                                                                                                                                                                                                                                4
The telltale signs                                                                   Prevention is better than cure

                                                  Employees who choose to steal confidential information or breach their               Prosecuting data theft is one thing. Still, having effective and up-to-date employ-
                                                  restrictive covenants do not want to get caught.                                     ment contracts in place is by far the most effective way of preventing theft
                                                                                                                                       of confidential information and protecting against unfair competition. While
3       77             6                14
                                                  In 93% of cases, the employer did not discover the theft of the confidential         it is outside the scope of our survey, putting in place and maintaining such
                                                  information until after the employee had already left the business. Prevention       contracts continues to make up a large part of our work with the recruitment
             57              3               31   is always better
                                                             7     than cure2and this statistic leads us to conclude that businesses   sector. Significant value can be added to a recruitment business by avoiding
3       77             6                14        are still not implementing adequate IT security measures to prevent and              problems in the first place. Ensuring employees are completely clear on what
                                                  detect theft the moment systems have been compromised.                               they can and cannot do when they leave is vital, and businesses need to be
             57              3               31             7              2
                                                                                                                                       assured that enforcement, if it becomes necessary, is as swift and pain free as
                                                  The chart below depicts how our clients first realised that they had been a          possible. If proper contracts are in place, recruitment businesses are ahead
                                                  victim of theft of confidential data:                                                of the game in pursuing employees who are looking to compete unfairly.

                                                                                                                                       Employment contracts for recruitment companies must contain certain
                                                                                                                                       fundamental provisions that will aid the company in protecting the business
                                                                                                                                       when a consultant leaves. Database policies, email and internet policies and
                                                                                                                                       effective confidential information clauses are all part of a recruitment business’
                                                                                                       External Tip-Off 57%            armoury in this regard. The key protection, and the trickiest provision in any
                                                                                                                                       contract, is the set of post-termination restrictive covenants that should
                                                                                                                                       appear in every consultant’s contract, along with anyone else who has access
                                                                                                       Whistle Blowing 3%              to confidential information, has contact with clients and candidates, or is
                                                                                                                                       influential on other members of staff.
         Businesses still do not have                                                                                                                                                                                        If proper contracts are in
         in place or implement ad-                                                            Internal Security Checks 31%                                                                                                   place, recruitment busi-
         equate IT security measures                                                                                                                                                                                         nesses are one step ahead of
                                                                                                                                       What information can you protect?
         to prevent and detect theft                                                                                                                                                                                         the game when it comes to
         the moment systems have                                                                             By Chance 7%                                                                                                    pursuing employees who are
                                                                                                                                       The implied duty of confidentiality that exists in every employment relation-
         been compromised.                                                                                                                                                                                                   looking to unfairly compete.
                                                                                                                                       ship only gets recruitment companies so far. A properly drafted confidentiality
                                                                                                                                       clause is crucial to ensure that there is no doubt as to what information is
                                                                                                                  Other 2%
                                                                                                                                       regarded as confidential. In addition, we recommend that clients include an
                                                                                                                                       appropriate right of search to check belongings for stolen databases, an email
                                                                                                                                       and internet policy authorising searches of employees’ emails and the monitoring
                                                  0                  15                  30                  45                  60    of computer use to ensure that there is no drip-feed of confidential information
                                                                                                                                       out of the organisation. A statement of database rights also leaves consultants
                                                                                                                                       in no doubt that recruitment companies consider their database to be
                                                  0The majority of cases
                                                                     15 of data theft and
                                                                                        30 covenant breach45were discovered by  60     extremely valuable, that it can be protected and that the company in question
                                                  clients through external tip-offs. For instance, an existing client or candidate     will fight hard to protect it.
                                                  told the business that they had been contacted “out of the blue” by the former
                                                  employee, having not previously registered with the competitive agency.
                                                  Internal security measures such as monitoring email accounts and introducing
                                                  alert systems to computer equipment helped to detect 31% of the instances
                                                  of data theft. Often though, the evidence of wrongdoing emerged by chance.
                                                  In one case, the business just happened to review a LinkedIn account and
                                                  noticed that there had been a mass migration of its business contacts to the
                                                  individual’s personal network just before that employee resigned.

    5                                                                                                                                                                                                                                                       6
Protecting relationships                                                             Taking Action

                                        Departing consultants can do serious damage to a recruitment business without        You should act swiftly to preserve evidence of wrongdoing and take legal steps
                                        stealing anything at all. Recruitment is an industry built on relationships, and     to recover your data and enforce your covenants.
                                        failure to put in place effective restrictive covenants can fundamentally affect
                                        profitability through loss of staff, clients and candidates. While recruitment       There are many options available to your business. By far the most powerful
                                        companies cannot prevent departing employees from taking clients and                 is to seek the High Court’s assistance in obtaining an injunction. There are a
                                        candidates indefinitely, effective restrictive covenants will give these companies   range of Orders that the Court can grant which include the following:
                                        breathing space and a chance to shore up valuable relationships in order to
                                        prevent them walking out the door with the employee. Such provisions can             The Search Order
                                        also lay the bases for the type of actions described below.
                                                                                                                             Often referred to as the “nuclear weapon” in legal circles, this allows a physical
                                        Restrictive covenants are difficult to enforce and need to be properly drafted       search of any relevant premises of the persons that have misappropriated and
                                        at the outset of employment. They need to be considered carefully to ensure          misused the confidential information. The Search Order allows you to ‘preserve’
                                        that they protect the legitimate business interest of the company, are reason-       the evidence of wrongdoing before an individual has an opportunity to destroy
                                        able in time and area, and are no wider than necessary. This is why restrictive      or conceal it.
                                        covenants need to be tailored to the individual business having regard to the
                                        type of client, where its business comes from and where it sources its               The Computing “Imaging” Order
                                        candidates from. There are many forms of restrictive covenants, including
                                        restrictions on competing per se and restrictions on the solicitation of and         This type of Order allows for a copy to be taken of all of the Defendant’s
                                        dealing with key candidates, clients and employees. We also believe that             computer systems (and other electronic storage devices) so as to preserve
                                        the poaching of employees will become an increasingly big concern in the             your confidential data and any evidence of wrongdoing that may be held on
                                        recruitment industry as the market recovers. Non-poaching and team move              those systems. More often than not, the key evidence is found on computers
                                        clauses should therefore be considered for senior individuals who have               rather that hard copy documents.
                                        influence over a team.
    Recruitment is an industry
                                                                                                                             “Doorstep” Delivery-Up Order
    built on relationships, and                                                                                                                                                                                   The poaching of employees
                                        In the last couple of years, we have seen Courts taking a more relaxed view
    failure to put in place effective                                                                                                                                                                             will become an increasingly
                                        on restrictive covenants. They are allowing longer and wider restrictions to         This is a similar order to a Search Order but the aggrieved party and their
    restrictive covenants can fun-                                                                                                                                                                                big concern in the recruitment
                                        be enforced when departing employees are looking to compete, but it remains          solicitors are not allowed on the premises unless invited. Instead the suspect
    damentally affect profitability.                                                                                                                                                                              industry as the market recovers.
                                        crucial to obtain proper advice on individual restrictions in order to ensure        must, literally, hand over any material he has stolen to your lawyers.
                                        their enforceability. Contracts also need to be up to date and checked every
                                        couple of years, and they need to be signed in order to protect their enforce-       Restraining Injunctions
                                        ability.
                                                                                                                             The above Orders can be combined with restraining injunctions so that suspects
                                                                                                                             are prevented from using stolen information and must disclose what they
                                                                                                                             have done with it. It also ensures that they comply with post-termination
                                                                                                                             restrictive covenants.

                                                                                                                             This is just a sample of the many options which are available in helping you
                                                                                                                             protect your confidential information.

7                                                                                                                                                                                                                                                    8
How do you prevent data theft                                                      Conclusion
    and enforce your covenants?

                                                                                       Data theft and unfair competition remains a real threat to all recruitment
    The best approach is to take proactive steps rather than simply closing the        businesses and as the state of the economy continues to improve that threat
    stable door after the horse has bolted.                                            will become greater. Recruitment companies must act now to ensure that
                                                                                       they take the necessary steps to prevent this problem from becoming
    Consider the issues below to gauge how well this is currently being done in        widespread. We are here to help you.
    your business:

    – What measures are in place to prevent data theft by employees? How               Mishcon de Reya
    would you detect it if your data was stolen?
                                                                                       Recruitment Specialists: Fraud        Recruitment Specialists: Employment
    – How secure are your IT systems?
                                                                                       Dan Morrison                          Daniel Naftalin
    – Do your contracts of employment contain a definition of confidential             Tel. 020 7440 7124                    Tel: 020 7440 7242
    information and restrictive covenants and, if so, are they specifically tailored   Email: dan.morrison@mishcon.com       Email: daniel.naftalin@mishcon.com
    to your business?
                                                                                       Rob Wynn Jones                        Will Winch
    – Do you regularly seek to enforce your contracts?                                 Tel: 020 7440 7443                    Tel: 020 7440 7292
                                                                                       Email: rob.wynnjones@mishcon.com      Email: will.winch@mishcon.com
    – Does your company handbook contain policies dealing with the use of
    social networking sites by employees?                                              Hugo Plowman                          Jennifer Millins
                                                                                       Tel. 020 7440 7149                    Tel: 020 7440 7137
    – Are you aware of the technological steps you can take to protect your            Email: hugo.plowman@mishcon.com       Email: jennifer.millins@mishcon.com
    assets?
                                                                                       Rhymal Persad	Susannah Kintish
    – Have you experienced data theft in your organisation in the last two years?      Tel. 020 7440 7424               Tel: 020 7440 7166
    What did you do? Have you implemented any lessons learnt?                          Email: rhymal.persad@mishcon.com Email: susannah.kintish@mishcon.com

    – Does your company have a high staff turnover?

    – Are employees aware of, and regularly reminded of, their duties of
    confidentiality?

    – Does your business suffer from a culture in which data theft is tolerated
    (“these are my contacts not yours”) and restrictive covenants are seen to
    be unenforceable?

9                                                                                                                                                                    10
Mishcon de Reya
Summit House
12 Red Lion Square
London
WC1R 4QD

T: +44 20 7440 7000
F: +44 20 7404 5982
E: contactus@mishcon.com

www.mishcon.com
You can also read