Another option would be to use tools like Zgate or Zlock from Zecurion. Zgate monitors e-mail and social networking communications to detect and block attempts--whether intentional or inadvertent--to transmit sensitive or confidential information, and Zlock restricts the use of peripheral devices for storing or transmitting such data.
With Windows Rights Management in place, Devine might have been prevented from forwarding protected information via e-mail. Tools like Zgate or Zlock would have kept Devine from saving sensitive information to a USB thumb drive, or printing hard copies, or blocked attempts to communicate it via e-mail or social networks. Software such as Spector 360 would have captured every detail of Devine's actions--allowing Apple to thwart the alleged unethical behavior much sooner, and giving it the tools to quickly and easily conduct an extensive investigation at the push of a button.
Implementing tools to automate monitoring and proactively protect corporate data does not necessarily mean that the company has to act as Big Brother or spy on every action of employees. Having such applications in place, though, gives IT admins access to the details if needed, and provides the tools quickly detect and identify suspicious behavior before it becomes a federal case over US$1 million in kickbacks.
Sign up for Computerworld eNewsletters.