Operation method of anti-competitive intelligence

Physical preventive measures and protective measures commonly used by enterprises usually include safety fences, dogs, safety doors, safety doors, safes, security guards, defensive intelligence investigation systems (DIS) and monitors. Because these activities usually require additional tasks and personnel, they can be assigned to the security department or authorized to the information technology (IT) department.

Daily management protection

Daily management and protection include the training of employees' confidentiality awareness, the management of public information, the disposal of garbage and waste products, and the communication with "third parties".

Training of staff's confidentiality awareness

Because many information leaks are caused by the weak awareness of business secret protection of some employees in enterprises, the construction of employee safety awareness project is particularly important. The purpose to be achieved is not only to make people engaged in competitive intelligence work have safety awareness, but also to make employees at all levels realize the value of company information and the importance of management information. To this end, we can start from the following aspects:

(1) Optimize data information. Let employees know that some information can't be discussed in any other occasion except the working environment, such as product development and design, price list, research and development plan, etc.

(2) Use the marking system. The use of color code identification system will prevent many leaks, and the area that "only internal employees should know" can be marked inside the building;

(3) Sign contracts and confidentiality agreements with employees. This can ensure that all employees of the enterprise do not disclose any sensitive information. Employers usually have a bad habit of trying to get more information about their former enterprises from new employees. Confidentiality agreements and policies should be clearly written into the enterprise's manual to avoid disclosure;

(4) "Restaurant" mode. Restaurants often use colorful information identification cards to tempt your appetite. In fact, enterprises can also place the same "information service" in meeting rooms, canteens, photo copying rooms and other places where information is easy to spread, as a reminder and cultivation of employees' confidentiality awareness;

(5) Be alert to all the details around you. Participants will be blamed if they leave sensitive data in the meeting room through notes, conversations or blackboards. If the teleconference equipment and microphone are not carefully checked, we can only play some theoretical content to the general audience.

Public information management

In public information management, we should mainly start from the following aspects:

(1) Restrict the distribution of strategic key internal publications and distribute them only to employees;

(2) in the office building, in the security sensitive area, divide the posting notice or registration area;

(3) Improve the classification of suppliers, contractors, sales teams, supervisors and employees, and treat the sensitivity of different projects and other media forms differently;

(4) Before the publication of public publications, the publishing industry and publishing house shall submit copies of personal characteristic information or submit free copies to the company;

(5) Ask employees to know about the company and conduct personal investigation, and ask investigators to complete a copy of the final product;

(6) Before publishing, check the detailed information of all articles to be published in the publication.

Disposal of garbage and waste products

In the management of garbage waste, we should mainly start from the following aspects:

(1) Establish a confidentiality system. To establish a confidentiality system for all media, it is necessary not only to strictly divide documents, but also to handle the information in them to an unquestionable level;

(2) Develop procedures or discard steps for discarded secrets. Ensure that the secrets have been broken into pieces or completely burned, and establish a set of tracking files for the destroyed confidential materials;

(3) establish the investigation records of copying and faxing, or restrict all the copied and faxed pictures;

(4) Keep a certain distance from the business center. If possible, do not send confidential faxes or copy confidential documents from outside. This may lead to unexpected consequences due to human error or the perspective information of professional competitive intelligence personnel in public places;

(5) Check the office equipment. All devices that generate confidential information, such as printers, computers and fax machines, should not be placed in file piles or ordinary working environments;

(6) Destroy copies or carbon paper. If printers and fax machines use film or carbon paper, professionally trained competitive intelligence practitioners can read relevant information from the traces of these films or carbon paper. Therefore, before being destroyed, those readable media must be completely crushed.

Interaction with third parties

Third parties are often partners in the enterprise supply chain, however, they often become important information outflows. Therefore, it is necessary to strengthen the management of communication with third parties. Specific practices are as follows:

(1) Know your partner. See how much business suppliers and production partners have with other competitors. Find out the importance of your cooperation with other manufacturers and competitors, and measure your ownership value if you break this cooperative relationship;

(2) Protect all data and information in front of your "guests". You must protect your information unless there is a clear need. If information is disclosed or lost in a place listed as a public place, it will no longer be protected by law;

(3) Design and define the protocol. Establish an appropriate and legal boundary in the management system, and strive to ensure that everything conforms to laws and ethics, and eliminate inappropriate practices. Emphasize that everyone knows that documents, confidentiality agreements and competition contracts are legal, and draw a clear line between enterprises and other groups;

(4) The safety review shall include the third party. Over time, vendors and suppliers will usually establish close relationships with your competitors. Check the relationship between these third parties and you and your competitors, which is a work that needs to be done frequently;

(5) Draw a clear line with third parties and partners. Isolate the third party when dealing with other problems of the company. Minimize contact with organizations that are unable to handle your relationship with other related partnerships. Protecting enterprise information security technically refers to improving the advanced technology to protect enterprise information security. The so-called technical protection here mainly refers to the application of various software to protect network information. That is, all kinds of software are used to protect the information on the enterprise network. Network is a double-edged sword, and network security is also worrying. The public webpage of this enterprise is not only a place frequently visited by the other party, but competitors may also invade the internal website of this enterprise by illegal means, retrieve database materials, modify data, steal bank accounts and so on.

Generally speaking, the main technologies of network information security protection are firewall technology, encryption technology and authentication technology. Firewall technology is the barrier between intranet and external network. It uses a "code wall" to separate the internal network from the external network, and checks the data packets arriving at both ends of the wall to decide whether to release them, thus effectively blocking all kinds of malicious attacks and protecting the internal information of the enterprise.

Encryption technology uses modern cryptography to recombine information, so that only the sender and the receiver can decode the restored information. Through encryption technology, safe access can be realized and the safe transmission of data can be guaranteed.

Identity authentication is another important technology of enterprise information security. Authentication mainly includes identity authentication and information authentication, which is mainly used to identify the legality of visitors and the authenticity of transmitted information.

In addition, there is a key factor that affects the security of network information, that is, the invasion of computer viruses and "network hackers". Enterprises should choose appropriate anti-virus software, firewall and other software according to actual needs to technically protect the internal information security of enterprises. Sun Tzu said, "The shape of a soldier is extremely great. As for invisibility; Invisible people can't look deep, and wise people can't make plans. " Mao Zedong once said, "Taking all kinds of deception means is likely to lead the enemy into a prison where he makes wrong judgments and takes wrong actions, thus losing his advantage and enthusiasm." It can be seen that in the anti-competitive intelligence strategy, proper use of false information can often make the intelligence operation of competitors and opponents ineffective.

False information is often called false information. This kind of false information will indeed have a great impact when an enterprise makes major decisions, although almost all competitive intelligence personnel believe that it is immoral to deliberately publish news that runs counter to the actual future activities within their own companies or to create false information from other companies. But many people still accept it. Most of them take this approach based on intelligence considerations and hide what the company is really doing. In this way, through the publicity of the plan that does not actually exist, the attention of competitors will be diverted from the really important and truly confidential plan, and the final implementation will be successful.

To sum up, a complete competitive intelligence system cannot be without anti-competitive intelligence work. While collecting, analyzing and making decisions on competitors, strengthening self-protection has been paid more and more attention by many enterprises. Only by establishing and perfecting the anti-competitive intelligence mechanism of enterprises, effectively defending against opponents' attacks and protecting the core information resources of enterprises in the fierce market economy competition has become a prominent topic of competitive intelligence research in the new period.