Accessing Your Data Remotely

Remote access: The ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network.We live in and increasingly mobile society. We travel more for work, personal pleasure and in some cases we even have jobs where we are expected to work from home. Obviously there are heaps of advantages to this kind of mobile lifestyle, but there are also some challenges. The challenge we want to discuss here is maintaining consistent, secure access to your information.There are a few ways that you can get access to information from remote servers and personal computers. All of them have their advantages and disadvantages. What we all want to accomplish is access to information where and when we need it. Here are some ways you can get access to your information remotely;· Put the information into your own website that has a secure log-in· Get access through a VPN (virtual private network) on the Internet· Get some Remote access software that hooks you up to your personal PC· Use remote control software for managing a PC from another PC· Keep your data on a secure third party serverThere are pro’s and con’s to all of the different methods above. Here are some of the considerations;· Is your data secure?· Is the software you are using to get to your data quick to install on a remote PC?· Is the PC where the data is stored always hooked to the internet?· Does your PC have firewall protection to prevent unwanted access?· Is your PC always powered up and ready to go?· Does anyone else have access to your PC that could turn it off and cause you to loose access?· Is your PC or server reliable and always working?· Is there someone available to reboot your PC or server if it goes down?· Do you know how to set up and maintain your own VPN?The above information is not meant to be comprehensive, but rather to give you an idea of some of the issues you face when trying to maintain reliable remote access to your information. As you can see there are a variety of problems that can occur. The biggest single issue is the availability and condition of the PC that stores the data. The challenge is to find a method that assures your access to your information, no matter what!Lots of things can cause your PC to be offline. Your PC may crash and no one is there to re-boot it. Your internet access could go down and you have no way to get the link going again remotely. Someone with physical access to your PC could interfere with it and then not be available to fix it. You could make administrator changes to your PC that could cause your remote access to fail. You can probably add to this list without too much trouble.There are lots of reasons for needing to have mobile access to information. The key thing is that when you need it, you need it. You really want to be able to rely on your information being at your fingertips. If you need to do a presentation and your presentation is not available it can be devastating. If you are working to a deadline and you can’t get access to critical documents or data, what do you do?What makes telecommuting and mobile work possible is secure, reliable and efficient access to the people you work with and the data you require to do your job. If your access is sporadic, then your results are as well, aren’t they? So how do you assure access and avoid problems?An ideal solution is to store your information on a hosted, secure, robust server that is looked after by professionals that are operating from a business strength facility with redundant services and 24 hour care. In this scenario there are many added advantages;· Your data is always online· Data is consistently and frequently backed-up.· You are using a powerful business strength server· You don’t need your own servers, firewalls, etc.· The links to the Internet are normally redundant and therefore seldom down.· You are not as reliant on technical people.· You don’t face resource problems from lack of disk space or processing power.· Such facilities generally have good virus protection.· Normally you can get a copy of your data back-up at any time.· The facility is typically ‘on the fly’ scalable to your requirements.· The cost and risk is generally much less than buying and operating your own infrastructure.Particularly where a small organization or an individual is involved, the simplest solution is always the best. Why take on the risk of operating your own facilities when you can easily outsource the service for less money and far less hassle? It leaves you time to do what you do best!


Intellectual Property Protection Issues in Outsourcing

Nature and critical importance of intellectual property vary across industries and types of business. Software development outsourcing requires high level of knowledge sharing between customer organization and vendor. Consequently, IP rights of stakeholders are involved in one form or another. Thus intellectual property management and data protection issues have become increasingly important for businesses utilizing offshore/nearshore outsourcing.Intellectual property that can be transferred to the vendor may include software, data, business and technology processes, trade secrets, inventions, know-how as well as other confidential information and works of authorship. Furthermore some of it may belong to third parties and require licensing.Both customer and vendor must properly administer their IP and stick to overall business objectives in order to effectively manage information sharing. Benefits of sharing IP assets must outweight risks associated with outsourcing.The World Intellectual Property Organization (WIPO) emphasizes two critical IP-related concerns in offshore outsourcing: ownership of IP and “inadvertent, accidental or willful disclosure of confidential information and trade secrets” (loss of business knowledge). But in most cases these concerns can be overcome by properly conducting IP due diligence, thoroughly evaluating the vendor and taking appropriate IP-protection measures.IP Due DiligencePrior to concluding any outsourcing initiative customer organization should conduct IP due diligence and risk assessment. As a result the company will be able to safeguard its intellectual property and clearly define which functions should be kept in-house and which can be outsourced.IP due diligence may include the following indicative steps:· Identify areas of critical importance to your business· Carefully assess business knowledge and determine if moving it outside the company or to an offshore location will compromise company practices· Identify and document all of the IP assets associated with the outsourced task· Determine ownership rights in the identified IP
Carefully review third-party or jointly-owned IP

· Identify existing or alleged breaches of contract, infringements, disclosure of confidential information and trade secrets· Assess how well the legal infrastructure in the foreign country will protect IP rights· Determine jurisdiction and enforcement (applicable laws, their enforceability, dispute resolution mechanisms)· Define termination, expiration or exit clause of arrangement· Determine other IP-related responsibilities if applicable: ongoing maintenance and upgrades to the IP; payments of transfer fees; product liability, IP insurance, etc.Having conducted IP due diligence, the organization can proceed to evaluation of potential outsourcing partner. Results can be used during negotiation of outsourcing agreements to provide for IP-related issues that may arise.Practical business negotiations should be initiated only after being satisfied with vendor’s reputation, resources and compatibility of business culture. They should focus on the steps needed to be taken by both parties in order to safeguard and ensure proper use, sharing, licensing, development and improvement of the IP during and after the relationship. It should also include any relevant IP assets of third parties.Selection of the outsourcing vendor in the context of IP-related issuesWhen outsourcing, customer organization should scrutinize potential partner’s ability to safeguard confidential information of commercial value against misappropriation, misuse, sabotage, loss or theft.
Check that the vendor has a documented and enforceable information security management policy in place

Review outsourcing vendor’s data security and IP protection practices as well as processes they have in place to protect customer’s confidential information

Check whether additional security policies can be implemented to protect your sensitive data

Provide vendor with only the minimum proprietary technology or data needed to complete the project

Insist on clear documentation of all source code of your project as it becomes your company’s property and is legally protected

Scrutinize physical security and personnel practices, policies and procedures

Demand tight human resources screening, look for employee retention figures

Find out whether vendor does business with your competitors; if yes, ensure that there is no contact between respective teams

Choose an established partner that complements your business strategy and understands how to implement required level of security
Practical measures for protection of intellectual propertyIntellectual property is one of the company’s most valuable assets. This is especially true for SMEs and startups where it can be the only tangible assets. Risks of not protecting IP are further escalated when outsourcing comes into play. That’s why customer organizations must effectively deal with related issues and use all types of IP protection: physical, electronic and legal.Physical and electronic protection of intellectual property
Treat data security as an exigency

Limit the number of people who have access to the full information

Make sure that outsourcing vendor has a physically secure facility (mechanical and electronic access control, intrusion detection, video monitoring etc)

Check whether offshore team uses computers without removable media to reduce the risk of unauthorized access to your IP

Ensure that in-house employees understand what information can and cannot be shared

Use firewalls, VPN, encryption and other measures to prevent breaches of security in electronic environment, which may lead to disruptions in the supply chains

Protect important information, such as source code, with passwords and access codes, and make sure that they are not widely available (both onsite and offshore)

Always maintain original copy of the source code

Make sure that any test data being used does not reveal real information
Legal protection of intellectual property· Determine what country’s legal system will govern and have jurisdiction over contract disputes· Work to understand the legal system and culture of both countries· Find out how IP rights enforcement works in provider’s country· Negotiate a clearly stated contract that specifically addresses business knowledge and IP-related issues and make vendor responsible for the actions of its employees. This will allow to ensure appropriate protection, avoid disagreements and prevent litigation· Clearly define compliance audit procedures prior to engaging into outsourcing relationships· Clarify licensing and source code ownership· Consider open source software issues
Enforce individual privacy in the context of database protection obligations (if applicable)

· Rely on non-disclosure and non-compete agreements with the vendor or its team members for keeping vital business information confidential· Define mechanism for possible dispute resolution and arbitration

RCA M7204 4 GB Video MP3 Player with 2.8-Inch Touch Screen Display

  • 4GB Memory – 1200 songs
  • 2.8″ Touch Screen and Video and Photo Playback – JPEG
  • FM Radio with Record
  • Built-in Rechargeable Battery
  • Free 3GB Locker from MP3 tunes


Chill Pill CHI2598 Mobile Speakers for iPod/MP3 and Laptops – Pink

  • Rugged case protects the speakers, battery & retractable cables
  • Speakers magnetically click together for easy transport
  • Chill Pill has three modes: Travel Mode
  • Rechargeable lithium ion battery provides six hours of playing time
  • Better sound reproduction and range than traditional laptop speakers

The highly-reviewed Chill Pill Mobile Speakers are the perfect accessory for iPhone, iPod, MP3 player or Mac or PC. With outsized sound and a rugged design, Chill Pill Speakers will become an essential part of your digital traveling kit. Chill Pill is a pocket-sized, self-contained capsule that transforms into two powered speakers. It is designed for people who enjoy listening to music out loud wherever they are. Perfect for listening to music, podcasts and audiobooks at home or on the go. Chill Pill is compatible with devices that have a standard 1/8″ headphone port, including iPods, iPhone 3G, original iPhone (with adapter), computers, CD players and more.