Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and Management

Balancing the First Amendment with Brand Reputation after Breaches

By Jerry J. Brennan, Lynn Mattice
March 1, 2015

Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues? 

Today, with very little exception, news and media outlets deliver content to their targeted audience with the intent of receiving financial gain through sales and advertising. Editors, producers and reporters remain in their roles and advance their careers based on a variety of factors supporting the monetary advancement of their organization. 

If media utilize property or materials they know to be – or that a reasonable person would conclude are highly likely to have been – acquired in direct conflict with criminal or civil statues, are they not, in effect, profiting from either a crime or a tort? Those of you who have served in law enforcement have many times seen someone arrested and convicted for possessing and/or selling stolen property, and even the media themselves have hosted television shows of police “sting operations.”  Is this not the same issue by a different name?

Admittedly, there is the argument that stolen physical property is easier to legislate because the owner is permanently deprived of it. If we are going to address the issue of intellectual property and the ease in which thousands of terabytes of data can be copied, we must address all the contributing elements in order to discourage the utilization of such information as well as the wrongful acquisition of it.

Going forward, ethically, should we encourage a standard that is contrary to the rule of law that excludes the presentation of evidence based on illegal search and seizure? If the police cannot use such materials, why is it acceptable for a person or organization to profit from using it?  Just because an individual or organization doesn’t like how a government agency or public corporation are legally performing their activities, is it acceptable to obtain and then publish (sell) material the person or entity does not have a legal right to? 

An additional question must also be asked:  Are there exceptions that should be taken into account? Yes there are, and there have been a number of circumstances in which the disclosure of information pertaining to illegal acts has served the public interest and exposed illegal conduct by corporate and government leaders. 

However, this should be examined carefully. Consideration must be given to utilizing other, less nefarious means to obtain the information and ensure the assumptions are factual and have not been cherry picked to support a personal or political cause.  

This is a particularly slippery slope when it comes to government programs and activities that have been duly authorized and funded. Selective amnesia on the part of elected leadership seems to be an ongoing epidemic. However, protection of these assets is expected, and there are growing legislative requirements. 

Now more than perhaps at any other time in history, private information, intellectual property and the work products of individuals and all organizations are under attack. The results of these breaches, incidents and losses due to a wide range of issues are significant negative economic impact that can further cause harm. Additionally, it is challenging and very costly for organizations to address this via our civil and criminal courts. 

The media is supported in the protections of their copyrights and content. However, no individual or company should profit from the use of another’s intellectual property unless they have been rightly granted access to it. To do nothing facilitates this trend of gaining from the property of others, and conveys subtle encouragement with the goal of feeding public voyeurism. There should not be two standards in play.    

KEYWORDS: brand security cyber attack data breach intellectual property protection intellectual property security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Mattice 2016 200px

Lynn Mattice is Managing Director of Mattice & Associates, a top-tier management consulting firm focused primarily at assisting enterprises with ERM, cyber, intelligence, security and information asset protection programs. He can be reached at: matticeandassociates@gmail.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Don't Gamble with Your Future!

    See More
  • Laying the Groundwork to Become an Effective Influencer

    See More
  • SEC0421-Career-Feat-Slide1-900px

    Positive brand reputation will advance your security career

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing